Showing 3,221 - 3,240 results of 4,946 for search '(( different evolution algorithm ) OR ( different evaluation algorithm ))', query time: 0.16s Refine Results
  1. 3221

    An Integrated Optimization Framework for Connected and Automated Vehicles and Traffic Signals in Urban Networks by Meiqi Liu, Yalan Li, Xiaofei Liu, Yang Chen, Ruochen Hao

    Published 2025-03-01
    “…The optimization framework is solved using the Dijkstra algorithm, dynamic programming, and linear programming, with linearization and decomposition techniques employed to improve computational efficiency. …”
    Get full text
    Article
  2. 3222

    Implementasi Algoritma Random Forest Untuk Menentukan Penerima Bantuan Raskin by Ilham Kurniawan, Duwi Cahya Putri Buani, Abdussomad Abdussomad, Widya Apriliah, Rizal Amegia Saputra

    Published 2023-04-01
    “…The performance of the classification algorithm is evaluated by various metrics such as Precision, Accuracy, F-Measure, and Recall. …”
    Get full text
    Article
  3. 3223

    Estimation of the High-Frequency Feature Slope in Gravitational Wave Signals from Core Collapse Supernovae Using Machine Learning by Alejandro Casallas-Lagos, Javier M. Antelis, Claudia Moreno, Ramiro Franco-Hernández

    Published 2024-12-01
    “…We conducted an in-depth exploration of the use of different machine learning (ML) for regression algorithms, including Linear, Ridge, LASSO, Bayesian Ridge, Decision Tree, and a variety of Deep Neural Network (DNN) architectures, to estimate the slope of the high-frequency feature (HFF), a prominent emergent feature found in the gravitational wave (GW) signals of core collapse supernovae (CCSN). …”
    Get full text
    Article
  4. 3224

    Towards Automatic Expressive Pipa Music Transcription Using Morphological Analysis of Photoelectric Signals by Yuancheng Wang, Xuanzhe Li, Yunxiao Zhang, Qiao Wang

    Published 2025-02-01
    “…In this paper, we assess different transcription processes and algorithms applied to signals captured by optical sensors mounted on a pipa—a traditional Chinese plucked instrument—played using a range of techniques. …”
    Get full text
    Article
  5. 3225

    Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication by K. Saravanan, K. B. Gurumoorthy, Allwin Devaraj Stalin, Om Prakash Kumar

    Published 2025-01-01
    “…In this proposed model, the CSI is exploited to evaluate the channel utilization and actual capacity availability throughout the allocation intervals. …”
    Get full text
    Article
  6. 3226

    Improving energy efficiency for intelligent reflecting surface assisted PD-NOMA in EH relaying network by Hong Nguyen-Thi, Thuc Kieu-Xuan, Thang Le-Nhat, Anh Le-Thi

    Published 2025-02-01
    “…To determine the efficiency of PSO, we consider two other techniques: Genetic Algorithm (GA) and Exhaustive Search (ES). Finally, we evaluate the proposed model's performance in different scenarios, such as the number of IRS elements and the number of relay nodes, the relaying selection strategies, and the transmit power at the BS. …”
    Get full text
    Article
  7. 3227

    Multi-attribute bottleneck identification method for hybrid flow shops in panel furniture intelligent manufacturing by Xinyi Yue, Xianqing Xiong, Mei Zhang, Xiutong Xu

    Published 2025-06-01
    “…Further, to evaluate the feasibility and efficiency of the method, this paper compares the implementation of the two phases: comparison of IGA with five advanced algorithms called QIA, PSO, AIS, ACO and B&B and comparison of EW-TOPSIS with traditional bottleneck identification methods. …”
    Get full text
    Article
  8. 3228

    A Novel Multi-Step Forecasting-Based Approach for Enhanced Burst Detection in Water Distribution Systems by Xi Wan, Raziyeh Farmani, Edward Keedwell, Xiao Zhou

    Published 2024-09-01
    “…For an online burst detection method based on flow time series data, the challenge arises in the variability of anomaly definitions across different datasets, rendering a one-size-fits-all anomaly detection algorithm impossible. …”
    Get full text
    Article
  9. 3229

    Log-Based Analysis of Creativity in the Context of Computational Thinking by Rotem Israel-Fishelson, Arnon Hershkovitz

    Published 2024-12-01
    “…We took a learning analytics log-based approach to evaluate measures of CT and creativity. We developed a Python algorithm to automatically analyze the logged solutions across four creativity measures. …”
    Get full text
    Article
  10. 3230

    Accelerating RRT* convergence with novel nonuniform and uniform sampling approach by Sivasankar Ganesan, Mohanraj Thangamuthu, Balakrishnan Ramalingam, Madan Mohan Rayguru, Sethu Narayanan Tamilselvan

    Published 2025-08-01
    “…The proposed RRT*-NUS method is evaluated against six baseline algorithms: RRT*, Informed RRT*, RRT*-N (normal sampling RRT*), GS-RRT* (goal-oriented sampling RRT*), DR-RRT* (directional random sampling RRT*), and hybrid-RRT* in three different 384*384 2D simulation scenarios. …”
    Get full text
    Article
  11. 3231

    Risk identification and assessment of Internet public opinion on public emergencies based on Bayesian network and association rule mining by Mengjie You, Xuwei Pan, Chuwen Zhu

    Published 2025-07-01
    “…Building upon this foundation, we construct a BN model with strong interpretability to identify the public opinion key risk factors and key risk chains of different risk levels, as well as to evaluate the public opinion situation. …”
    Get full text
    Article
  12. 3232

    Enhanced bearing health indicator extraction using slope adaptive signal decomposition for predictive maintenance by Dev Bhanushali, Pooja Kamat, Harsh Dhiman

    Published 2025-06-01
    “…This study introduces the Slope Adaptive Signal Decomposition (SASD) algorithm, a novel method for extracting enhanced intrinsic machine health indicators from vibration data. …”
    Get full text
    Article
  13. 3233

    DETERMINING A TYPE OF A DAMAGE IN THE CURRENT PROTECTION OF POWER LINES OF 6–35 KV by F. A. Romaniuk, E. V. Buloichik, O. A. Huryanchyk, M. A. Shevaldin

    Published 2017-11-01
    “…It is demonstrated that in a lot of cases of arch short circuits in the loaded power line and in idle mode, the control only asymmetry is insufficient for reliable determination of the type of damage. A better algorithm has been proposed for determining phase-to-phase short circuit based on the control and the analysis of the two relative unbalance currents determined by the current values of the differences of the phase currents of the line. …”
    Get full text
    Article
  14. 3234

    Optional and mandatory assignment strategies for dynamic vehicle routing with time windows by Mustafa Demirbilek

    Published 2025-09-01
    “…After optimizing the methods through sensitivity analyses, we evaluated their performance against Clarke and Wright's Savings Algorithm (CW) across various real-world-inspired scenarios, including different time window lengths, interarrival times, and region types. …”
    Get full text
    Article
  15. 3235

    A speed optimization model for connected and autonomous vehicles at expressway tunnel entrance under mixed traffic environment. by Jianrong Cai, Yang Liu, Zhixue Li

    Published 2024-01-01
    “…Firstly, a CAV speed optimization model is established based on a shooting heuristic algorithm. The model targets the minimization of the weighted sum of the speed difference between adjacent vehicles and the time taken to reach the tunnel entrance. …”
    Get full text
    Article
  16. 3236

    Reinforcement-Learning-Based Edge Offloading Orchestration in Computing Continuum by Ioana Ramona Martin, Gabriel Ioan Arcas, Tudor Cioara

    Published 2024-11-01
    “…The learning agent’s performance was evaluated using different hyperparameter configurations and varying episode lengths or knowledge graph model sizes. …”
    Get full text
    Article
  17. 3237

    Graph-Based Semi-Supervised Learning with Bipartite Graph for Large-Scale Data and Prediction of Unseen Data by Mohammad Alemi, Alireza Bosaghzadeh, Fadi Dornaika

    Published 2024-09-01
    “…Lastly, most graph-based algorithms rely on affinity matrices that capture pairwise similarities across all data points, thus limiting their scalability to large-scale databases. …”
    Get full text
    Article
  18. 3238

    Advanced hybrid computational analysis of febuxostat solubility using machine learning in supercritical processing method by Turki Al Hagbani, Rami M. Alzhrani, Majed Ahmed Algarni

    Published 2025-07-01
    “…The final models obtained were then evaluated and compared using different criteria. With the R2 criterion, the GPR predictive model has a score of 0.819 and the KNN model has a score of 0.854, but the voting model has a score of 0.980, which shows that the combined voting method using the other two models has a better result than both of them. …”
    Get full text
    Article
  19. 3239

    A Novel Architecture for Addressing the Throughput Bottleneck in Spaceborne Solid-State Recorder for Electromagnetic Spectrum Sensors by Xufeng Li, Li Zhou, Yan Zhu

    Published 2025-01-01
    “…Data are distributed and stored in different memory regions controlled by separate FPGAs. …”
    Get full text
    Article
  20. 3240

    Silent speech recognition using visual cascading fusion of tongue-lip movements based on pre-trained and fine-tuned model by Chongchong Yu, Xuening Wang, Zhaopeng Qian

    Published 2025-04-01
    “…Traditionally, in the field of SSR using tongue-lip visual information, data augmentation and feature fusion have received the most attention. Different from traditional approaches, we proposed to fuse the tongue-lip visual information by a cascading fusion algorithm to achieve “visual co-occurrence” of the tongue and lip frame by frame. …”
    Get full text
    Article