-
801
Stability Evaluation of Slope Based on Global Sensitivity Analysis
Published 2024-01-01“…Three engineering cases have been studied for engineering application, and the compared results indicate that the impact of the geotechnical parameters uncertainty on the safety factor (Fs) and failure probability (pf) are different. Therefore, the approaches based on GSA which can integrate the Fs with pf will be a promising approach for slope stability evaluation.…”
Get full text
Article -
802
Optimization of Body Size and Centroid Position of the Quadruped Robot based on Improved Particle Swarm Optimization Algorithm
Published 2021-07-01“…Taking the quadruped robot as research object, a method to optimize body size and centroid position of the quadruped robot based on improved particle swarm optimization algorithm to enhance its stability is proposed. In order to establish optimization performance evaluation indexes and design variables, the body dynamics model is established, the influence of different centroid positions of the robot on its motion stability is analyzed. …”
Get full text
Article -
803
Research and application of optimization of physical education training model based on multi-objective differential evolutionary algorithm
Published 2025-12-01“…In order to study the application of the multi-objective differential evolution algorithm in the field of sports transportation. …”
Get full text
Article -
804
SOURCES OF DIFFERENCES IN CALCULATIONS AND EXPERIMENTAL TEST RESULTS OF FATIGUE LIFE OF STRUCTURAL ELEMENTS
Published 2014-06-01Get full text
Article -
805
-
806
Improved Cluster Intelligent and Complex Optimization Algorithm for Power Equipment CAD-Assisted Intelligent Operation and Maintenance
Published 2022-01-01“…Finally, the results of example analysis show that compared with the traditional naming entity recognition algorithm, BiLSTM-softmax and Seq2Seq-Attention model, the algorithm in this study is better than the traditional algorithm in the three evaluation index values of accuracy, recall, and F1 value.…”
Get full text
Article -
807
Detection of vehicles and analysis of traffic volume by real-time video-graphic technique using python algorithm
Published 2025-08-01“…The Mean Absolute Percentage Error performance evaluation produced three separate results totaling 2.5%, 3.1%, and 2.8%. …”
Get full text
Article -
808
Comparison of principal component analysis algorithms for imputation in agrometeorological data in high dimension and reduced sample size.
Published 2024-01-01“…Based on statistical evaluation, the NIPALS-PCA, EM-PCA, and IM imputation models proved suitable for estimating missing ETo data, with PCA imputation models in the NIPALS and EM algorithms showing the most promise. …”
Get full text
Article -
809
Optimization of artificial intelligence in localized big data real-time query processing task scheduling algorithm
Published 2024-10-01“…A task scheduling algorithm optimization model was designed using support vector machine (SVM) and K-nearest neighbor (KNN) combined with fuzzy comprehensive evaluation. …”
Get full text
Article -
810
A competitive coevolution-based evolutionary algorithm for the parallel inverse design of multiple soft network materials
Published 2025-08-01“…To address these design constraints, we developed an innovatively competitive coevolution-based differential evolution algorithm with multi-population architecture (CCMPDE). …”
Get full text
Article -
811
Web Service Reputation Evaluation Based on QoS Measurement
Published 2014-01-01“…In this paper, the factual QoS running data are collected by our WS-QoS measurement tool; based on these objectivity data, an algorithm compares the difference of the offered and measured quality data of the service and gives the similarity, and then a reputation evaluation method computes the reputation level of the Web service based on the similarity. …”
Get full text
Article -
812
Selection Method of Cross-Border e-Commerce Export Logistics Mode Based on Collaborative Filtering Algorithm
Published 2022-01-01“…Secondly, a logistics selection model based on collaborative filtering algorithm is constructed, and the model is verified by a practical case of a specific export cross-border e-commerce company. …”
Get full text
Article -
813
Zebra optimization algorithm incorporating opposition-based learning and dynamic elite-pooling strategies and its applications.
Published 2025-01-01“…Specifically, it achieves faster iteration speeds across four different environments, with the planned path length after escaping local optima being shortened by an average of 7.55175 m (16.291%) compared to other optimization algorithms. …”
Get full text
Article -
814
Use of Data Mining for Intelligent Evaluation of Imputation Methods
Published 2025-06-01“…Data imputation techniques allow the estimation of MV using different algorithms, by means of which important data can be imputed for a particular instance. …”
Get full text
Article -
815
Closing Price Prediction of Cryptocurrencies BTC, LTC, and ETH Using a Hybrid ARIMA-LSTM Algorithm
Published 2025-06-01“…The methodology includes an exploratory data analysis, followed by the design, implementation, and evaluation of each individual algorithm as well as the combined hybrid algorithm. …”
Get full text
Article -
816
Design and accuracy evaluation of AI orthognathic surgery plates
Published 2024-04-01Get full text
Article -
817
The cost-effectiveness of different diagnostic options of TB among HIV-infected patients
Published 2014-12-01“…Diagnostic of active tuberculosis among HIV – infected people is difficult problem, demanding of significant healthcare costs.The objective: to evaluate the cost-effectiveness of different diagnostic scenarios detecting tuberculosis among HIVinfected.Material and methods: the evaluation was carried out through modeling, from the health care system perspective, in cohorts with different CD 4+ counts (<200, 200–499, >500). …”
Get full text
Article -
818
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
819
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
820
ML-Based Materials Evaluation in 3D Printing
Published 2025-05-01“…ML algorithms can analyze vast amounts of data from previous printing processes to predict the performance of different materials (including those used in multi-material printing) under different conditions. …”
Get full text
Article