Showing 801 - 820 results of 4,946 for search '(( different evolution algorithm ) OR ( different evaluation algorithm ))', query time: 0.22s Refine Results
  1. 801

    Stability Evaluation of Slope Based on Global Sensitivity Analysis by Zhaoxia Xu, Xiuzhen Wang, Lu Guo, Teng Yu

    Published 2024-01-01
    “…Three engineering cases have been studied for engineering application, and the compared results indicate that the impact of the geotechnical parameters uncertainty on the safety factor (Fs) and failure probability (pf) are different. Therefore, the approaches based on GSA which can integrate the Fs with pf will be a promising approach for slope stability evaluation.…”
    Get full text
    Article
  2. 802

    Optimization of Body Size and Centroid Position of the Quadruped Robot based on Improved Particle Swarm Optimization Algorithm by Kai Tang, Huanlong Wu, Liang′an Zhang, Ranming Ji, Yongjie Zhao, Xiaoyi Wang, Xinjian Lu

    Published 2021-07-01
    “…Taking the quadruped robot as research object, a method to optimize body size and centroid position of the quadruped robot based on improved particle swarm optimization algorithm to enhance its stability is proposed. In order to establish optimization performance evaluation indexes and design variables, the body dynamics model is established, the influence of different centroid positions of the robot on its motion stability is analyzed. …”
    Get full text
    Article
  3. 803

    Research and application of optimization of physical education training model based on multi-objective differential evolutionary algorithm by Man Wu

    Published 2025-12-01
    “…In order to study the application of the multi-objective differential evolution algorithm in the field of sports transportation. …”
    Get full text
    Article
  4. 804
  5. 805
  6. 806

    Improved Cluster Intelligent and Complex Optimization Algorithm for Power Equipment CAD-Assisted Intelligent Operation and Maintenance by Yinguan Song, Yu Zou, Yifeng Su, Ming Wang, Zhenjun Xie, Henglong Chen, Zhongqing Sang

    Published 2022-01-01
    “…Finally, the results of example analysis show that compared with the traditional naming entity recognition algorithm, BiLSTM-softmax and Seq2Seq-Attention model, the algorithm in this study is better than the traditional algorithm in the three evaluation index values of accuracy, recall, and F1 value.…”
    Get full text
    Article
  7. 807

    Detection of vehicles and analysis of traffic volume by real-time video-graphic technique using python algorithm by Osman Kantunsung Ramadan, R. Srinivasa Kumar, A. Narender Reddy

    Published 2025-08-01
    “…The Mean Absolute Percentage Error performance evaluation produced three separate results totaling 2.5%, 3.1%, and 2.8%. …”
    Get full text
    Article
  8. 808

    Comparison of principal component analysis algorithms for imputation in agrometeorological data in high dimension and reduced sample size. by Valter Cesar de Souza, Sergio Augusto Rodrigues, Luís Roberto Almeida Gabriel Filho

    Published 2024-01-01
    “…Based on statistical evaluation, the NIPALS-PCA, EM-PCA, and IM imputation models proved suitable for estimating missing ETo data, with PCA imputation models in the NIPALS and EM algorithms showing the most promise. …”
    Get full text
    Article
  9. 809

    Optimization of artificial intelligence in localized big data real-time query processing task scheduling algorithm by Maojin Sun, Luyi Sun

    Published 2024-10-01
    “…A task scheduling algorithm optimization model was designed using support vector machine (SVM) and K-nearest neighbor (KNN) combined with fuzzy comprehensive evaluation. …”
    Get full text
    Article
  10. 810

    A competitive coevolution-based evolutionary algorithm for the parallel inverse design of multiple soft network materials by Xiao Feng, Yuchen Lai, Xing Yang, Yongbin Yu, Fangling Li, Xiangxiang Wang, Jiacheng Liang, Jingye Cai, Shunze Cao

    Published 2025-08-01
    “…To address these design constraints, we developed an innovatively competitive coevolution-based differential evolution algorithm with multi-population architecture (CCMPDE). …”
    Get full text
    Article
  11. 811

    Web Service Reputation Evaluation Based on QoS Measurement by Haiteng Zhang, Zhiqing Shao, Hong Zheng, Jie Zhai

    Published 2014-01-01
    “…In this paper, the factual QoS running data are collected by our WS-QoS measurement tool; based on these objectivity data, an algorithm compares the difference of the offered and measured quality data of the service and gives the similarity, and then a reputation evaluation method computes the reputation level of the Web service based on the similarity. …”
    Get full text
    Article
  12. 812

    Selection Method of Cross-Border e-Commerce Export Logistics Mode Based on Collaborative Filtering Algorithm by Ying Yang

    Published 2022-01-01
    “…Secondly, a logistics selection model based on collaborative filtering algorithm is constructed, and the model is verified by a practical case of a specific export cross-border e-commerce company. …”
    Get full text
    Article
  13. 813

    Zebra optimization algorithm incorporating opposition-based learning and dynamic elite-pooling strategies and its applications. by Tengfei Ma, Guangda Lu, Zhuanping Qin, Tinghang Guo, Zheng Li, Changli Zhao

    Published 2025-01-01
    “…Specifically, it achieves faster iteration speeds across four different environments, with the planned path length after escaping local optima being shortened by an average of 7.55175 m (16.291%) compared to other optimization algorithms. …”
    Get full text
    Article
  14. 814

    Use of Data Mining for Intelligent Evaluation of Imputation Methods by David Red, Carlos R. Primorac

    Published 2025-06-01
    “…Data imputation techniques allow the estimation of MV using different algorithms, by means of which important data can be imputed for a particular instance. …”
    Get full text
    Article
  15. 815

    Closing Price Prediction of Cryptocurrencies BTC, LTC, and ETH Using a Hybrid ARIMA-LSTM Algorithm by Jherson S. Ruiz-Lopez, Miguel Jiménez-Carrión

    Published 2025-06-01
    “…The methodology includes an exploratory data analysis, followed by the design, implementation, and evaluation of each individual algorithm as well as the combined hybrid algorithm. …”
    Get full text
    Article
  16. 816
  17. 817

    The cost-effectiveness of different diagnostic options of TB among HIV-infected patients by V. E. Shumlyanskaya, A. V. Rudakova

    Published 2014-12-01
    “…Diagnostic of active tuberculosis among HIV – infected people is difficult problem, demanding of significant healthcare costs.The objective: to evaluate the cost-effectiveness of different diagnostic scenarios detecting tuberculosis among HIVinfected.Material and methods: the evaluation was carried out through modeling, from the health care system perspective, in cohorts with different CD 4+ counts (<200, 200–499, >500). …”
    Get full text
    Article
  18. 818

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  19. 819

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  20. 820

    ML-Based Materials Evaluation in 3D Printing by Izabela Rojek, Dariusz Mikołajewski, Krzysztof Galas, Jakub Kopowski

    Published 2025-05-01
    “…ML algorithms can analyze vast amounts of data from previous printing processes to predict the performance of different materials (including those used in multi-material printing) under different conditions. …”
    Get full text
    Article