Showing 4,501 - 4,520 results of 4,946 for search '(( different evolution algorithm ) OR ( different evaluation algorithm ))', query time: 0.17s Refine Results
  1. 4501

    Research on the Integration of Sensing and Communication Based on Fractional-Order Fourier Transform by Mingyan Qi, Yuelong Su, Zhaoyi Wang, Kun Lu

    Published 2025-05-01
    “…The simulation evaluated the detection performance of the two methods under different signal-to-interference ratios (SIR) and filter widths. …”
    Get full text
    Article
  2. 4502

    Novel Cuproptosis-Related Gene Signature for Precise Identification of High-Risk Populations in Low-Grade Gliomas by Ping Chen, Hailing Han, Xuejie Wang, Bing Wang, Zhanfeng Wang

    Published 2023-01-01
    “…In addition, LGG immune cell infiltration was viewed using CIBERSORT and ssGSEA algorithms and correlation analysis was done with cuproptosis-related genes. …”
    Get full text
    Article
  3. 4503

    Contrastive Disentangled Variational Autoencoder for Collaborative Filtering by Woo-Seong Yun, Seong-Min Kang, Yoon-Sik Cho

    Published 2025-01-01
    “…The proposed contrastive disentanglement framework is generic and thus adaptable to VAE-based recommender algorithms. We comprehensively evaluate our proposed method on popular datasets such as MovieLens20M and Netflix and show that it consistently outperforms corresponding VAE models, achieving superior performance across all metrics. …”
    Get full text
    Article
  4. 4504

    Machine Learning Unveils the Impacts of Key Elements and Their Interaction on the Ambient-Temperature Tensile Properties of Cast Titanium Aluminides Employing SHAP Analysis by Shiqiu Liu, Li Liang

    Published 2025-05-01
    “…Comparative analysis of three algorithms within the training dataset proved the random forest regression (RFR) as the optimal modeling approach. …”
    Get full text
    Article
  5. 4505

    AIoT-Driven Human Activity Recognition for Versatile Framework on Multipurpose Applications by Nanik Triwahyuni, Eni Wardihani, Aminuddin Rizal, Samuel Beta, Ricky Sambora, Rindang Oktaviani

    Published 2025-06-01
    “…Before real-time performance was taken, we evaluated 5 different machine learning model and choose which one is more optimized. …”
    Get full text
    Article
  6. 4506

    Utilizing Artificial Intelligence for Microbiome Decision-Making: Autism Spectrum Disorder in Children from Bosnia and Herzegovina by Džana Bašić-Čičak, Jasminka Hasić Telalović, Lejla Pašić

    Published 2024-11-01
    “…Model accuracy was evaluated, and an external dataset was introduced to test model generalizability. …”
    Get full text
    Article
  7. 4507
  8. 4508

    Physical education and sport activity assessment tool-based machine learning predictive analysis for planification of training sessions by Mohamed Rebbouj, Said Lotfi

    Published 2024-09-01
    “…Conclusions Incorporating the Machine Learning techniques may encourage the change in the way we teach physical education and sport activities; otherwise, the assessment based on ML techniques will give a different overview on how to start a learning cycle and follow it up. …”
    Get full text
    Article
  9. 4509

    Impact of Hypoglycemia on Glucose Variability over Time for Individuals with Open-Source Automated Insulin Delivery Systems by Arsalan Shahid, Dana M. Lewis

    Published 2024-10-01
    “…The experimental results are further validated on T1DEXI data (n = 222), originating from commercial AID systems. Different hypoglycemia categorization approaches did not show significant differences in glycemic variability outcomes. …”
    Get full text
    Article
  10. 4510

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  11. 4511

    Debris Flow Susceptibility Prediction Using Transfer Learning: A Case Study in Western Sichuan, China by Tiezhu Li, Qidi Huang, Qigang Chen

    Published 2025-07-01
    “…In this study, debris flow susceptibility models were developed using three machine learning algorithms: Support Vector Machine (SVM), Random Forest (RF), and Extreme Gradient Boosting (XGBoost). …”
    Get full text
    Article
  12. 4512

    Advancing malware imagery classification with explainable deep learning: A state-of-the-art approach using SHAP, LIME and Grad-CAM. by Sadia Nazim, Muhammad Mansoor Alam, Syed Safdar Rizvi, Jawahir Che Mustapha, Syed Shujaa Hussain, Mazliham Mohd Suud

    Published 2025-01-01
    “…Nowadays, AI is significantly employed for evaluations in cybersecurity that find it challenging to justify their proceedings; this absence of accountability is alarming. …”
    Get full text
    Article
  13. 4513

    Inversion model of stress state reconstruction for geological hazard pipelines based on digital twin by Xue Luning, Tian Mingliang, Zhao Juncheng

    Published 2025-07-01
    “…The results indicate that the research model has high prediction accuracy and efficiency and can effectively handle the problem of predicting pipeline stress states under different geological disasters, providing a reliable method for evaluating pipeline stress states in geological disasters.…”
    Get full text
    Article
  14. 4514

    Deep-Learning-Based Solar Flare Prediction Model: The Influence of the Magnetic Field Height by Lei Hu, Zhongqin Chen, Long Xu, Xin Huang

    Published 2025-04-01
    “…This paper investigates how different magnetic field heights affect solar flare prediction performance. …”
    Get full text
    Article
  15. 4515

    Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality by Muhammad Babar Imtiaz, Rabia Kamran

    Published 2025-06-01
    “…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
    Get full text
    Article
  16. 4516

    Optimizing Semantic-Aware Video Compression Using Particle Swarm Optimization Technique for Automotive Applications by Vadivel Shanmugam, B. Uma Maheswari

    Published 2025-01-01
    “…This popular and fast-developing technology aims to increase vehicle safety through various sensors and advanced-level Artificial Intelligence (AI)- based algorithms. The camera is one of the vital components of AM systems, which captures real-time videos, processes, encodes, packetizes and transfers them to different processing units for further applications. …”
    Get full text
    Article
  17. 4517

    Human-in-the-loop control strategy for IoT-based smart thermostats with Deep Reinforcement Learning by Payam Fatehi Karjou, Fabian Stupperich, Phillip Stoffel, Drk Müller

    Published 2025-05-01
    “…The study explores the challenges of transferring control behaviors from simulation environments to real-world settings, examining the performance across different thermal zones and evaluating the integration flexibility of the control strategy within building systems. …”
    Get full text
    Article
  18. 4518

    Development of Cyber Security Platform for Experiential Learning by Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

    Published 2024-06-01
    “…The present research proposes a comprehensive web-based platform that can be used to communicate, collaborate and practice various use cases in the domain of network intrusion detection tools using machine learning algorithms and to evaluate user experience. The proposed platform CySecLearn is a collection of various functionalities and features that ensures experiential learning, will help the learner to develop critical thinking and expertise in network security and promote digital literacy in the domain of cyber security.…”
    Get full text
    Article
  19. 4519

    MIE-SPD: A New and Highly Efficient Chaos-Based Multiple Image Encryption Technique With Synchronous Permutation Diffusion by Bibhudendra Acharya, Javvadi Venkata Sravan, Durga Ram Janaki Potnuru, K. Abhimanyu Kumar Patro

    Published 2025-01-01
    “…Due to the advancement of computing technologies and the Internet of Things, there has been a notable rise in image data in different sectors. Having safety mechanisms in place is crucial to protect image data from unauthorised access. …”
    Get full text
    Article
  20. 4520

    Identification of reference genes for RT-qPCR in the Antarctic moss Sanionia uncinata under abiotic stress conditions. by Mira Park, Soon Gyu Hong, Hyun Park, Byeong-Ha Lee, Hyoungseok Lee

    Published 2018-01-01
    “…In this report, 11 traditionally used and 6 novel candidate reference genes were selected from transcriptome data of S. uncinata and the expression stability of these genes was evaluated under various abiotic stress conditions using three statistical algorithms; geNorm, NormFinder, and BestKeeper. …”
    Get full text
    Article