Showing 1,961 - 1,980 results of 4,946 for search '(( different evolution algorithm ) OR ( different evaluation algorithm ))', query time: 0.17s Refine Results
  1. 1961

    Dynamic identification method for flow patterns of liquid-solid two-phase flow in horizontal pipelines by ZHUJUNLIANG Junliang, ZHAOZHIFENG, WANGSHUGANG, JIANG Shuang

    Published 2025-01-01
    “…An experimental platform is built to verify the results, and the reconstruction effect is evaluated using relative error. The research results indicate that although there is some differences between the reconstructed flow pattern obtained by the DMD based identification method for liquid-solid two-phase flow patterns and the true flow pattern, the differences is within an acceptable range and can objectively reflect the evolution process of liquid-solid two-phase flow patterns. …”
    Get full text
    Article
  2. 1962

    SLPDBO-BP: an efficient valuation model for data asset value by Cuiping Zhou, Shaobo Li, Cankun Xie, Panliang Yuan, Zihao Liao

    Published 2025-04-01
    “…Secondly, in an attempt to comprehensively evaluate the optimization performance of SLPDBO, a series of numerical optimization experiments are carried out with 20 test functions and with popular optimization algorithms and dung beetle optimizer (DBO) algorithms with different improvement strategies. …”
    Get full text
    Article
  3. 1963

    Well-log lithofacies classification based on machine learning for Chang-7 member in Longdong area of Ordos Basin by SHEN Li,WANG Caizhi,NING Congqian,LIU Yingming,WANG Hao

    Published 2023-08-01
    “…After comparing the application effects of different unbalanced data classification algorithm in the region, it’s found that bagging algorithm of ensemble learning notably improved the classification performance of all lithofacies by combining multiple classifiers. …”
    Get full text
    Article
  4. 1964

    University proceedings. Volga region. Technical sciences by V.V. Konovalov, M.V. Dontsova, A.N. Rasstegaev, V.Yu. Zaitsev

    Published 2025-05-01
    “…Materials and methodsThe research provided for the development of a calculation methodology and algorithm implemented in the MatchCAD mathematical package in the form of a computer model for comparative evaluation and optimization of calculating the number of parts processed by machines of different types based on the limitations available in production. …”
    Article
  5. 1965

    Optimization of Traffic Congestion Management in Smart Cities under Bidirectional Long and Short-Term Memory Model by Yujia Zhai, Yan Wan, Xiaoxiao Wang

    Published 2022-01-01
    “…Then, the experimental simulation verification and prediction performance evaluation are performed. Finally, the data predicted by the BiLSTM algorithm model are compared with the actual data and the data predicted by the long short-term memory (LSTM) algorithm model. …”
    Get full text
    Article
  6. 1966

    Semi-supervised dynamic community detection based on non-negative matrix factorization by Zhen-chao CHANG, Hong-chang CHEN, Rui-yang HUANG, Hong-tao YU, Yang LIU

    Published 2016-02-01
    “…How to effectively combine the network structures on different time points was the key and difficulty to affect the performance of detection algorithms. …”
    Get full text
    Article
  7. 1967

    Improved Convolutional Neural Networks for Course Teaching Quality Assessment by Yun Liu

    Published 2022-01-01
    “…In this paper, a separate long-term recursive convolutional network (SLRCN) microexpression recognition algorithm is proposed using deep learning technology for building a course teaching effectiveness evaluation model. …”
    Get full text
    Article
  8. 1968

    Detection and Analysis of Malicious Software Using Machine Learning Models by Selman Hızal, Ahmet Öztürk

    Published 2024-08-01
    “…Utilizing a real-world dataset of prevalent malware types such as spyware, ransomware, and trojan horses, our study addresses the evolving challenges of cybersecurity. In this study, we evaluate the performance of ML algorithms for obfuscated malware detection using the CIC-MalMem-2022 dataset. …”
    Get full text
    Article
  9. 1969

    Parametric Model for Coaxial Cavity Filter with Combined KCCA and MLSSVR by Shengbiao Wu, Huaning Li, Xianpeng Chen

    Published 2023-01-01
    “…First, the low-dimensional tuning data is mapped to the high-dimensional feature space by kernel canonical correlation analysis, and the nonlinear feature vectors are fused by the kernel function; second, the multioutput least squares support vector regression algorithm is used for parametric modeling to solve the problems of low accuracy and poor prediction performance; third, the support vector of the parameter model is optimized by the differential evolution whale algorithm (DWA) to improve the convergence and generalization ability of the model in actual tuning. …”
    Get full text
    Article
  10. 1970

    Generating Dark Matter Subhalo Populations Using Normalizing Flows by Jack Lonergan, Andrew Benson, Daniel Gilman

    Published 2025-07-01
    “…We present a comparative analysis of strong gravitational lensing signatures generated by dark matter subhalo populations using two different approaches. The first approach models subhalos using an empirical model, while the second employs the Galacticus semi-analytic model of subhalo evolution. …”
    Get full text
    Article
  11. 1971

    Machine learning and multi-omics analysis reveal key regulators of proneural–mesenchymal transition in glioblastoma by Can Xu, Jin Yang, Huan Xiong, Xiaoteng Cui, Yuhao Zhang, Mingjun Gao, Lei He, Qiuyue Fang, Changxi Han, Wei Liu, Yangyang Wang, Jin Zhang, Ying Yuan, Zhaomu Zeng, Ruxiang Xu

    Published 2025-06-01
    “…Functional and pathway analyses showed that PMTRGs were highly expressed in the C1 subcluster, which was associated with GBM mesenchymal isoforms, pathways, and poor prognosis, and showed stronger immune responses. Four immune evaluation algorithms and TIDE analysis showed that the C1 cluster had high levels of immune cell infiltration and immune molecule scores. …”
    Get full text
    Article
  12. 1972

    Multiobjective Optimization Design of a Fractional Order PID Controller for a Gun Control System by Qiang Gao, Jilin Chen, Li Wang, Shiqing Xu, Yuanlong Hou

    Published 2013-01-01
    “…To enhance the robustness of the algorithm for different problems, an adapting scheme of the mutation operation is further employed. …”
    Get full text
    Article
  13. 1973

    Phase Space Similarity as a Signature for Rolling Bearing Fault Diagnosis and Remaining Useful Life Estimation by Fang Liu, Bing He, Yongbin Liu, Siliang Lu, Yilei Zhao, Jiwen Zhao

    Published 2016-01-01
    “…Secondly, the normalized cross-correlation (NCC) is employed to calculate the PSS between bearing data with different states. Based on the PSS, a fault pattern recognition algorithm, a bearing fault size prediction algorithm, and a RUL estimation algorithm are introduced to analyze the experimental signal. …”
    Get full text
    Article
  14. 1974

    A routing-benefited deployment approach combining static and dynamic layouts for underwater optical wireless networks by Zhongwei Shen, Hongxi Yin, Yanjun Liang, Rigele Maao, Lianyou Jing

    Published 2021-02-01
    “…A routing-benefited deployment algorithm combining static and dynamic layouts is proposed, and its comprehensive performance evaluation is given in this article. …”
    Get full text
    Article
  15. 1975

    A Time-Frequency Research for Ultrasonic Guided Wave Generated from the Debonding Based on a Novel Time-Frequency Analysis Technique by Junhua Wu, Zheshu Ma, Yonghui Zhang

    Published 2017-01-01
    “…In the algorithm, a masking step is proposed, which can guarantee that the peak-track algorithm can automatically exact the instantaneous frequency and the instantaneous amplitude of different modes on the Smoothed Pseudo Wigner-Ville distribution. …”
    Get full text
    Article
  16. 1976

    Shadow hamiltonian simulation by Rolando D. Somma, Robbie King, Robin Kothari, Thomas E. O’Brien, Ryan Babbush

    Published 2025-03-01
    “…Applications of this approach to quantum simulation problems include simulating the dynamics of exponentially large systems of free fermions or free bosons, the latter example recovering a recent algorithm for simulating exponentially many classical harmonic oscillators. …”
    Get full text
    Article
  17. 1977

    Task offloading and resource allocation in vehicle heterogeneous networks with MEC by Haibo ZHANG, Qiuji LUAN, Jiang ZHU, Fangwei LI

    Published 2018-09-01
    “…Based on the advantages of high-bandwidth and low-latency brought by mobile edge computing (MEC),which could provide IT service environment and cloud computing capability,combined with the long-term evolution unlicensed (LTE-U) technology,the task offloading decision and resource allocation issues in vehicle heterogeneous network were studied.Considering the link differentiation requirements,which were the high capacity of vehicle-to-roadside unit (V2I) links and the super reliability of vehicle-to-vehicle (V2V) links,quality of service (QoS) was modeled as the combination of capacity and latency.Firstly,the improved K-means algorithm was used to cluster the request vehicles according to different QoS to determine the communication mode.Secondly,the LTE-U technology based on non-competition period (CFP) which was combined with carrier aggregation (CA) technology,and the distribution Q-Learning algorithm were adopted to allocate the channel and power.The simulation results show that the proposed mechanism can maximize the V2I link traversal capacity while ensuring the reliability of the V2I link.…”
    Get full text
    Article
  18. 1978

    Electrowetting display of multiscale Gamma based on dynamic histogram equilibrium by Mingzhen Chen, Zhixian Lin, Shanling Lin, Jianpu Lin, Tailiang Guo

    Published 2025-07-01
    “…The experimental results demonstrate that the images processed by this algorithm after brightness enhancement show certain improvements in objective evaluation indicators. …”
    Get full text
    Article
  19. 1979

    From attributes to communities: a novel approach in social network generation by Muhtar Çağkan Uludağlı, Kaya Oğuz

    Published 2024-11-01
    “…Our method is compared against other node-attributed social network generators in the area with using both different evaluation metrics and a real-world dataset. …”
    Get full text
    Article
  20. 1980

    Rolling Bearing Fault Diagnosis Method Based on Improved Variational Mode Decomposition and Information Entropy by Wen FAN, Lian GE, Xiaoting XIAO, Fangji GAN, Xin LAI, Hongxia DENG, Qi HUANG

    Published 2022-02-01
    “…A new fitness function combining differential evolution (DE) algorithm with gray wolf optimization (GWO) algorithm is proposed to form a new hybrid optimization algorithm, named DEGWO. …”
    Get full text
    Article