Showing 121 - 140 results of 5,195 for search '(( differential evaluation algorithm ) OR ( different evaluation algorithm ))', query time: 0.26s Refine Results
  1. 121

    Early warning processing results and algorithm improvement for doublet earthquakes in different locations in Xinjiang by Weiheng Yu, Shuilong Li, Shiwen Zhou

    Published 2025-05-01
    “…These measures can help improve the off-site doublet earthquake processing algorithm in the Fujian early warning system.…”
    Get full text
    Article
  2. 122
  3. 123
  4. 124

    Investigating the InSAR Phase Bias in the SBAS Algorithm and Its Effect on Different Landcovers by Ebrahim Karami, Siavash Shami, Yasser Maghsoudi, Babak Ranjgar, Saeed Azadnejad

    Published 2025-01-01
    “…The most common InSAR algorithms for monitoring displacement are SBAS and PS time series. …”
    Get full text
    Article
  5. 125

    Prediction of contact resistance of electrical contact wear using different machine learning algorithms by Zhen-bing Cai, Chun-lin Li, Lei You, Xu-dong Chen, Li-ping He, Zhong-qing Cao, Zhi-nan Zhang

    Published 2024-01-01
    “…Machine learning (ML) algorithms were used to predict the electrical contact performance of different factors after wear to determine the correlation between different factors and contact resistance. …”
    Get full text
    Article
  6. 126

    An Effective Genetic Algorithm for Mixed Precision by Wanyu Zhang, Yu Shang, Min Tsao, Yiwei Li, Xiaoyu Song

    Published 2025-01-01
    “…Our method leverages algorithmic differentiation and first-order Taylor series approximation to assess the impact of precision variations efficiently. …”
    Get full text
    Article
  7. 127

    Matching heterogeneous ontologies with adaptive evolutionary algorithm by Xingsi Xue, Haolin Wang, Xin Zhou, Guojun Mao, Hai Zhu

    Published 2022-12-01
    “…Then, an Adaptive Evolutionary Algorithm (AEA) is proposed to effectively solve this problem. …”
    Get full text
    Article
  8. 128

    Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps by Je Sen Teh, Abubakar Abba

    Published 2024-10-01
    “…Unlike conventional cryptography, evaluating the security margins of chaos-based encryption against attacks such as differential cryptanalysis is complex. …”
    Get full text
    Article
  9. 129

    Evaluating techniques of artificial intelligence for social robots by Jessica K. Barfield

    Published 2025-03-01
    “…As a relatively unexplored topic of research the current study evaluated whether the perception of robot intelligence was influenced by different techniques of AI. …”
    Get full text
    Article
  10. 130

    Hybrid System for Fault Tolerance in Selective Compliance Assembly Robot Arm: Integration of Differential Gears and Coordination Algorithms by Claudio Urrea, Pablo Sari, John Kern

    Published 2025-01-01
    “…The system employs redundant actuators, differential gears, torque limiters, and rapid detection and reconfiguration algorithms. …”
    Get full text
    Article
  11. 131

    Enhancing User Differentiation in the Electronic Personal Synthesis Behavior (EPSBV01) Algorithm by Adopting the Time Series Analysis by Mohanaad Shakir

    Published 2025-02-01
    “…The research methodology, which involves analyzing and evaluating existing authentication methods in web-based systems, is a key component of this study. …”
    Get full text
    Article
  12. 132

    Evaluation of the Effectiveness of Lightweight Encryption Algorithms on Data Performance and Security on IoT Devices by Damar Indrajati, Wahid Miftahul Ashari

    Published 2025-06-01
    “…This study evaluates the effectiveness of five encryption algorithms—SIMON64/128, SPECK64/128, XTEA64/128, PRESENT64/128, and AES128—on IoT devices through experimental analysis of their security strength, execution time, CPU utilization, memory usage, and power efficiency. …”
    Get full text
    Article
  13. 133

    Developing a hybrid model for comparative analysis of financial data clustering algorithms by Mojtaba Movahedi, Mahdi Homayounfar, Mehdi Fadaei, Mansour Soufi

    Published 2023-09-01
    “…Due to the importance of using these algorithms in analyzing financial market data that have a high volume and scope, this study in order to select the best clustering algorithm for clustering companies listed on the Tehran Stock Exchange in the field of finance from It has used different clustering algorithms and evaluated the validity of these algorithms and selected the best algorithm.Methodology: This research is applied in terms of purpose and descriptive in terms of implementation method and is of quantitative type (mathematical modeling). …”
    Get full text
    Article
  14. 134

    Research of UAV 3D path planning based on improved Dwarf mongoose algorithm with multiple strategies by Lixin Mu, Wenhui Liu, Haocheng Wang, Yu Zhang

    Published 2025-07-01
    “…Comparative evaluations on benchmark test functions demonstrate that the improved algorithm (CDMOS) outperforms the original DMO in optimization performance, convergence precision, and overall stability, achieving an average improvement of 53.5% in convergence accuracy and 35.1% in solution stability across 29 benchmark functions. …”
    Get full text
    Article
  15. 135

    Unifying heterogeneous hyperspectral databases for in vivo human brain cancer classification: Towards robust algorithm development by Alberto Martín-Pérez, Beatriz Martinez-Vega, Manuel Villa, Raquel Leon, Alejandro Martinez de Ternero, Himar Fabelo, Samuel Ortega, Eduardo Quevedo, Gustavo M. Callico, Eduardo Juarez, César Sanz

    Published 2025-01-01
    “…The present study is distinguished by an analysis and comparison of the performance of various algorithms, with the objective of evaluating their efficacy in unifying hyperspectral databases obtained from different cameras. …”
    Get full text
    Article
  16. 136

    Performance Evaluation of Some Selected Classification Algorithms in a Facial Recognition System by Michael Olumuyiwa Adio, Ogunmakinde Jimoh Ogunwuyi, Mayowa Oyedepo Oyediran, Adebimpe Omolayo Esan, Olufikayo Adepoju Adedapo

    Published 2024-05-01
    “…Hence, this work evaluated the performance of the Learning Vector Quantization; Relevance Vector Machine and Support Vector Machine classification algorithms in facial recognition system and Support Vector Machine outwit the other two algorithms in facial recognition in term of specificity, recognition time and recognition accuracy at different threshold. …”
    Get full text
    Article
  17. 137

    Improved anticipatory scheduling algorithm based on workload characteristic and service time evaluation by Jin-zhong CHEN, Nian-min YAO, Shao-bin CAI, Mei-ling SUN

    Published 2015-01-01
    “…Anticipatory scheduling (AS) of Linux I/O schedule layer assigns fixed anticipation period length to each process.It will introduce extra delay if I/O request does not arrive in time.The improved anticipatory scheduling (WPCAS) algorithm is proposed which is based on workload characteristic and service time.WPCAS includes process classifier(PC) module and request service time evaluation (STE) module.PC module assigns different anticipation period lengths in terms of workload characteristic.STE module decides whether to anticipate the coming request according to service time.Experimental results show that WPCAS algorithm is superior to 95%-Heuristic and AS in terms of throughput,average waiting time of anticipation success and deceptive idleness.…”
    Get full text
    Article
  18. 138

    Evaluating the Minimum Spanning Trees Using Prim's Algorithm with Undirected Neutrosophic Graphs by Sukanta Ghadei, Amaresh Chandra Panada, Surapati Pramanik, Nihar Ranjan Panda, Prasanta Kumar Raut

    Published 2025-06-01
    “…Neutrosophic numbers with components reflecting truth, uncertainty, and Neutrosophic Sets and Systems, Vol. 85, 2025 362 Sukanta Ghadei, Amaresh Chandra Panada,Surapati,Pramanik, Nihar Ranjan Panda, Prasanta Kumar Raut, Evaluating the Minimum Spanning Trees Using Prim's Algorithm with Undirected Neutrosophic Graphs falsehood provide a more sophisticated method of expressing uncertainty in network modeling. …”
    Get full text
    Article
  19. 139
  20. 140