Showing 2,861 - 2,880 results of 4,946 for search '(( different evolution algorithm ) OR ( different evaluation algorithm ))', query time: 0.23s Refine Results
  1. 2861

    An effective Key Frame Extraction technique based on Feature Fusion and Fuzzy-C means clustering with Artificial Hummingbird by Sumandeep Kaur, Lakhwinder Kaur, Madan Lal

    Published 2024-11-01
    “…This study proposes a key frame extraction method from a video that (i) first removes insignificant frames by pre-processing, (ii) second, four visual and structural feature differences among the consecutive frames are extracted and aggregated to identify informative frames, (iii) third, to cluster the obtained frames, a hybrid FCM-AHA method is proposed by combining Fuzzy C-means(FCM) with artificial hummingbird optimization algorithm (AHA) to circumvent the local minima trapping problem of FCM, and finally, from each cluster, the two frames having greatest Euclidean distance from all the other frames within a cluster is selected as key frames to remove redundant frames. …”
    Get full text
    Article
  2. 2862

    Dose prediction of CyberKnife Monte Carlo plan for lung cancer patients based on deep learning: robust learning of variable beam configurations by Yuchao Miao, Jiwei Li, Ruigang Ge, Chuanbin Xie, Yaoying Liu, Gaolong Zhang, Mingchang Miao, Shouping Xu

    Published 2024-11-01
    “…We compared the gamma passing rate, dose difference maps, and relevant dose-volume metrics to evaluate the model’s performance. …”
    Get full text
    Article
  3. 2863

    IVIM-DWI-based radiomic model for preoperative prediction of hepatocellular carcinoma differentiation by ZHUANG Yuxiang, LI Xiaofeng, ZHOU Daiquan

    Published 2024-10-01
    “…Support vector machine (SVM), logistic regression (LR) and random forest (RF) algorithms were utilized to construct different image omics models. …”
    Get full text
    Article
  4. 2864

    Development of Artificial Intelligent-Based Methodology to Prepare Input for Estimating Vehicle Emissions by Elif Yavuz, Alihan Öztürk, Nedime Gaye Nur Balkanlı, Şeref Naci Engin, S. Levent Kuzu

    Published 2024-11-01
    “…Machine learning has significantly advanced traffic surveillance and management, with YOLO (You Only Look Once) being a prominent Convolutional Neural Network (CNN) algorithm for vehicle detection. This study utilizes YOLO version 7 (YOLOv7) combined with the Kalman-based SORT (Simple Online and Real-time Tracking) algorithm as one of the models used in our experiments for real-time vehicle identification. …”
    Get full text
    Article
  5. 2865

    Toward value-based care using cost mining: cost aggregation and visualization across the entire colorectal cancer patient pathway by Maura Leusder, Sven Relijveld, Derya Demirtas, Jon Emery, Michelle Tew, Peter Gibbs, Jeremy Millar, Victoria White, Michael Jefford, Fanny Franchini, Maarten IJzerman

    Published 2024-12-01
    “…Per-patient CRC pathway costs ranged from $10,379 AUD to $41,643 AUD, and varied significantly per cancer stage such that e.g. chemotherapy costs in one cancer stage are different to the same chemotherapy regimen in a different stage. …”
    Get full text
    Article
  6. 2866

    An innovative methodology for segmenting vessel like structures using artificial intelligence and image processing by Reynaldo Villarreal, Sindy Chamorro-Solano, Steffen Cantillo, Roberto Pestana-Nobles, Sair Arquez, Yolanda Vega-Sampayo, Leonardo Pacheco-Londoño, Jheifer Paez, Nataly Galan-Freyle, Cristian Ayala, Paola Amar

    Published 2024-12-01
    “…The enhancement module processes the image using three different varaiables in the same way, which imposes a complexity of O(n) and takes 308,734 ms to execute; the segmentation module evaluates each pixel against its neighbors to correctly segment regions of interes, generating an $$O(n^{2})$$ quadratic complexity and taking 687,509 ms to execute; the masking module makes several runs through the whole image and in several occasions it calls processes of $$O(n\log n)$$ complexity at 581686 microseconds to execute, which makes it not only the most complex but also the most exhaustive part of the program. …”
    Get full text
    Article
  7. 2867

    Improving the quality of payment fraud detection by using a combined approach of transaction analysis by Світлана Гавриленко, Олексій Абдуллін

    Published 2024-12-01
    “…F1-score ranges from 96 to 100% for different subclasses. The feature importance within each subclass is evaluated by the gradient boosting algorithm. …”
    Get full text
    Article
  8. 2868

    MODELING OF WORK DEVICES WITH RPA TEST COMPLEX OMICRON CMC 356 by Pavel Vivchar, Dmitri Oleynikov, Victoria Lyhmanova, Svyatoslav Strakhov, Sergey Jastrebov, Anna Diachenko, Elena Zakharova

    Published 2022-05-01
    “…On the basis of the actual characteristics of the head sections offeeders for the city of Mineralnye Vody was developed simulation algorithm of the terminal Sirius-2-L, check the operation of the device protection in the event of damage at different points in the investigated area of the distribution network. …”
    Get full text
    Article
  9. 2869

    Complex Neutrosophic Approach for Uncertainty Management in Employment Competence for Higher Vocational College Students by Shuo Du, Lijuan Zhao

    Published 2025-05-01
    “…We introduce a real-world case study to optimize the evaluation of different vocational employment configurations based on ten competing criteria. …”
    Get full text
    Article
  10. 2870

    Assessment of binary prediction of fraudulent advertisements in ATS candidate tracking cloud systems by V. V. Ligi-Goryaev, G. A. Mankaeva, T. B. Goldvarg, S. S. Muchkaeva, V. V. Dzhakhnaev

    Published 2024-05-01
    “…Some features that could be useful in detecting fraudulent job ads include job location, job description, job requirements, job responsibilities, company information, and recruiter data. Subsequently, different machine learning algorithms can be trained on prepared datasets using standard methods such as cross-validation to assess their performance. …”
    Get full text
    Article
  11. 2871

    A Survey of Dense Object Detection Methods Based on Deep Learning by Yang Zhou, Hui Li

    Published 2024-01-01
    “…We discuss the similarities and differences, as well as the advantages and disadvantages, of dense object detection algorithms based on five different approaches: NMS, LOSS, re-scoring, transform and YOLO. …”
    Get full text
    Article
  12. 2872

    Graph convolution network for fraud detection in bitcoin transactions by Ahmad Asiri, K. Somasundaram

    Published 2025-04-01
    “…GCN is of special interest in our case. Different evaluation parameters such as accuracy, ROC and F1 score are analyzed for different models. …”
    Get full text
    Article
  13. 2873

    View-invariant object representation in anterior and posterior inferotemporal cortex: A machine learning approach by Jun-ya Okamura, Daisuke Fukano, Keisuke Murakami, Gang Wang

    Published 2025-12-01
    “…A classifier was trained by support vector machine (SVM) to create a hyperplane that separated one object from the other three objects at the same viewing angles, and then tested by response vectors to the object images at different viewing angles. In area TE, dynamics of the performance evaluated by d’ showed viewing angle tolerance of 30–90° to the objects with prior experience in learning association of different views. …”
    Get full text
    Article
  14. 2874

    Division of images into areas of local extrema with a monotonic change in pixel brightness by A. T. Nguyen, V. Yu. Tsviatkou

    Published 2021-07-01
    “…The developed algorithm differs from the known segmentation algorithms by using a set of brightness thresholds (by the number of regions), varying by one in each cycle, starting from the values of local extrema, taking into account the increase or decrease in brightness to select adjacent pixels that are attached to the regions formed from these local extrema. …”
    Get full text
    Article
  15. 2875

    A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain by Anshula Sangwan, Hukum Singh

    Published 2021-01-01
    “…A new asymmetric optical double image encryption algorithm is proposed, which combines phase truncation and singular value decomposition. …”
    Get full text
    Article
  16. 2876

    An Extensive Study Using the Beetle Swarm Method to Optimize Single and Multiple Objectives of Various Optimal Power Flow Problems by K. Sriram, S. P. Mangaiyarkarasi, S. Sakthivel, L. Jebaraj

    Published 2023-01-01
    “…This article deals with the use of beetle swarm optimization algorithm (BSOA), for optimal power flow (OPF) solution, in an effective approach. …”
    Get full text
    Article
  17. 2877

    Classification of Hybrid and Peking Duck DOD Varieties Based on Feather Images Using CNN by Khoironi, I Wayan Rangga Pinastawa

    Published 2025-07-01
    “…In this study, a deep learning approach with the Convolutional Neural Network (CNN) algorithm was applied to classify DOD varieties based on feather images. …”
    Get full text
    Article
  18. 2878

    Research on heat transfer characteristics of crude oil storage tank heated by jet in combination with mechanical stirring by Hang Dong, Xiaowan Liang, Xiaonian Xiong, Mingyu Lei, Jian Zhao

    Published 2025-07-01
    “…However, the internal heat transfer characteristics during heating and the effects of different agitators are unclear. This paper simulated the heating process of single jet and three agitators under different stirring speeds, considering crude oil rheology and wax crystal latent heat, using the SIMPLE algorithm. …”
    Get full text
    Article
  19. 2879

    Advanced Machine Learning and Deep Learning Approaches for Estimating the Remaining Life of EV Batteries—A Review by Daniel H. de la Iglesia, Carlos Chinchilla Corbacho, Jorge Zakour Dib, Vidal Alonso-Secades, Alfonso J. López Rivero

    Published 2025-01-01
    “…To address these, we propose a comprehensive set of evaluation metrics and emphasize the need for larger and more diverse datasets. …”
    Get full text
    Article
  20. 2880

    Optimization of clustering parameters for single-cell RNA analysis using intrinsic goodness metrics by Nicolina Sciaraffa, Antonino Gagliano, Luigi Augugliaro, Claudia Coronnello, Claudia Coronnello

    Published 2025-06-01
    “…Despite the advancements and numerous adaptations of clustering algorithms, the correct clustering of cells remains a challenging endeavor that is dependent on the data in question and on the parameters selected for the clustering process. …”
    Get full text
    Article