Search alternatives:
improve model » improved model (Expand Search)
Showing 3,681 - 3,700 results of 7,771 for search '(( improved (most OR post) optimization algorithm ) OR ( improve model optimization algorithm ))', query time: 0.40s Refine Results
  1. 3681
  2. 3682

    BED-YOLO: An Enhanced YOLOv10n-Based Tomato Leaf Disease Detection Algorithm by Qing Wang, Ning Yan, Yasen Qin, Xuedong Zhang, Xu Li

    Published 2025-05-01
    “…The experimental results demonstrated that the improved BED-YOLO model achieved significant performance improvements compared to the original model. …”
    Get full text
    Article
  3. 3683

    Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior by Huahua CHEN, Zhe CHEN

    Published 2022-12-01
    “…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
    Get full text
    Article
  4. 3684

    Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior by Huahua CHEN, Zhe CHEN

    Published 2022-12-01
    “…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
    Get full text
    Article
  5. 3685

    Identification of Low‐Value Defects in Infrared Images of Porcelain Insulators Based on STCE‐YOLO Algorithm by Shaotong Pei, Weiqi Wang, Chenlong Hu, Keyu Li, Haichao Sun, Mianxiao Wu, Bo Lan

    Published 2025-07-01
    “…To solve the above problems, this paper optimizes the small target and complex environment problems in the low‐value defect recognition of insulator infrared images, and proposes the STCE‐YOLO algorithm: based on YOLOv8, the deformable large kernel attention is used to improve the detection ability of small targets; then the cross‐modal contextual feature module is applied to Integrate the features of different scales to reduce the computation of the model. …”
    Get full text
    Article
  6. 3686

    A Heuristic Optical Flow Scheduling Algorithm for Low-Delay Vehicular Visible Light Communication by Zhengying Cai, Shumeng Lei, Jingyi Li, Chen Yu, Junyu Liu, Guoqiang Gong

    Published 2025-07-01
    “…In response to this problem, we propose a heuristic optical flow scheduling algorithm. First, the optical flow scheduling problem of VVLC is built as a multi-objective optimization model considering the makespan, delay, schedulable ratio, and bandwidth utilization with non-conflict constraints. …”
    Get full text
    Article
  7. 3687

    LG-YOLOv8: A Lightweight Safety Helmet Detection Algorithm Combined with Feature Enhancement by Zhipeng Fan, Yayun Wu, Wei Liu, Ming Chen, Zeguo Qiu

    Published 2024-11-01
    “…Evaluations on the SWHD dataset confirm the effectiveness of the LG-YOLOv8 algorithm. Compared to the original YOLOv8-n algorithm, our approach achieves a mean Average Precision (mAP) of 94.1%, a 59.8% reduction in parameters, a 54.3% decrease in FLOPs, a 44.2% increase in FPS, and a 2.7 MB compression of the model size. …”
    Get full text
    Article
  8. 3688

    Improving the System of Mandatory Requirements to Business under the Digital Transformation of Economy by S. A. Minich

    Published 2023-08-01
    “…Objective: to elaborate scientifically substantiated proposals for improving the system of mandatory requirements in the sphere of business and other economic activity under formation of digital economy, taking into account the foreign experience of eliminating barriers for business and the available practice of legislation optimization in this sphere.Methods: the research methodological basis consists of traditional general and specific methods of scientific cognition: dialectical, formal-logical, historical-comparative, systematic, terminological, general logic methods (analysis, synthesis, generalization, induction, deduction, etc.), as well as special methods: historical-legal, formal-legal, and method of comparative jurisprudence.Results: the author investigated and systematized theoretical approaches and experience of improving the system of mandatory requirements in foreign countries and the Russian Federation; the possibilities of introducing the most successful innovative legal instruments and practices to improve the regulation of economic relations were considered. …”
    Get full text
    Article
  9. 3689

    Mechanism of Immune System Based Multipath Fault Tolerant Routing Algorithm for Wireless Sensor Networks by Hongbing Li, Qingyu Xiong, Weiren Shi, Liwan Chen, Xin Shi, Qiang Chen

    Published 2013-12-01
    “…Mechanism of immune system is applied to do the variation on the initial antibody population, namely, the multiple disjoint paths, to establish the final optimal transmission paths. Mathematical model is established to do the theoretical analysis on the performance of the algorithm. …”
    Get full text
    Article
  10. 3690

    Mobile Robot Path Planning Based on Fused Multi-Strategy White Shark Optimisation Algorithm by Dazhang You, Junjie Yu, Zhiyuan Jia, Yepeng Zhang, Zhiyuan Yang

    Published 2025-07-01
    “…A novel multi-strategy fusion white shark optimization algorithm is proposed, focusing on actual scenario requirements, to provide optimal solutions for mobile robot path planning. …”
    Get full text
    Article
  11. 3691

    Set-Based Differential Evolution Algorithm Based on Guided Local Exploration for Automated Process Discovery by Si-Yuan Jing

    Published 2020-01-01
    “…Thirdly, a fine-grained evaluation technique is designed to assign score to each node in a process model, which is employed to guide the local exploration and improve the efficiency of the algorithm. …”
    Get full text
    Article
  12. 3692

    Post-Quantum Cryptographic Frameworks for Internet of Things (IoT) and Internet of Medical Things (IoMT) Authentication Systems by Thomas L Barna, Samson Isaac, Christopher Habu, Saratu Habu, Abimbola A Joseph

    Published 2025-06-01
    “…This work contributes three key advancements: (1) an optimized NTRU implementation for medical IoT devices, (2) a novel integration of metaheuristic optimization with post-quantum cryptography, and (3) comprehensive validation across IoMT device classes. …”
    Get full text
    Article
  13. 3693
  14. 3694

    A cooperative dynamic target search approach for multi-UAV systems utilizing the MAPPO algorithm by Peiyan Zhang, Guodong Li

    Published 2025-07-01
    “…In response to these issues, this study proposes an improved multi-agent proximal policy optimization algorithm (AS-MAPPO). …”
    Get full text
    Article
  15. 3695

    Stability Analysis and Construction Parameter Optimization of Tunnels in the Fractured Zone of Faults by Banma Huang, Haibo Chen, Chenglong Duan, Wenhu Li

    Published 2022-01-01
    “…Finally, the actual blasting effect of tunnel construction is tested and the optimization algorithm model of tunnel fault drilling and blasting parameters is established. …”
    Get full text
    Article
  16. 3696

    A self-learning method with domain knowledge integration for intelligent welding sequence planning by Weidong Shen, Xuewen Wang, Juanli Li, Yong Wang, Xiaojun Qiao

    Published 2025-07-01
    “…To improve the interpretability of the results, domain knowledge was integrated into the construction and training processes of a self-learning model. …”
    Get full text
    Article
  17. 3697

    Wood Panel Defect Detection Based on Improved YOLOv8n by Rui Li, Shilu Zhong, Xuemei Yang

    Published 2025-02-01
    “…However, the accuracy and convergence speed of existing defect detection techniques still require improvement. In this paper, an improved algorithm based on YOLOv8n was designed for accurate detection of wood panel defects. …”
    Get full text
    Article
  18. 3698
  19. 3699
  20. 3700