Showing 641 - 660 results of 5,881 for search '(differential OR different) (evolution OR evaluation) algorithm', query time: 0.25s Refine Results
  1. 641

    Iteration of Differentiable Functions under m-Modal Maps with Aperiodic Kneading Sequences by Maria F. Correia, Carlos C. Ramos, Sandra Vinagre

    Published 2012-01-01
    “…We consider the dynamical system (𝒜, 𝑇), where 𝒜 is a class of differentiable functions defined on some interval and 𝑇 : 𝒜 → 𝒜 is the operator 𝑇𝜙∶=𝑓∘𝜙, where 𝑓 is a differentiable m-modal map. …”
    Get full text
    Article
  2. 642
  3. 643

    Joint recommendation algorithm based on tensor completion and user preference by Zhi XIONG, Kai XU, Lingru CAI, Weihong CAI

    Published 2019-12-01
    “…Aiming at the problem that existing recommendation algorithms have little regard for user preference,and the recommendation result is not satisfactory,a joint recommendation algorithm based on tensor completion and user preference was proposed.First,a user-item-category 3-dimensional tensor was built based on user-item scoring matrix and item-category matrix.Then,the Frank-Wolfe algorithm was used for iterative calculation to fill in the missing data of the tensor.At the same time,a user category preference matrix and a scoring preference matrix were built based on the 3-dimensional tensor.Finally,a joint recommendation algorithm was designed based on the completed tensor and the two preference matrices,and the differential evolution algorithm was used for parameter tuning.The experimental results show that compared with some typical and newly proposed recommendation algorithms,the proposed algorithm is superior to the compare algorithms,the precision is improved by 1.96% ~ 3.44% on average,and the recall rate is improved by 1.35%~2.40% on average.…”
    Get full text
    Article
  4. 644

    A Review of Stochastic Optimization Algorithms Applied in Food Engineering by Laís Koop, Nadia Maria do Valle Ramos, Adrián Bonilla-Petriciolet, Marcos Lúcio Corazza, Fernando Augusto Pedersen Voll

    Published 2024-01-01
    “…It was observed that evolutionary methods are the most applied in solving food engineering optimization problems where the genetic algorithm and differential evolution stand out. Finally, remarks on the limitations and current challenges to improving the numerical performance of stochastic optimization methods for food engineering applications are also discussed.…”
    Get full text
    Article
  5. 645

    Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher by Ting Fan, Lingchen Li, Yongzhuang Wei, Enes Pasalic

    Published 2022-09-01
    “…The result shows that the designers’ security evaluation of ANU-II against differential cryptanalysis is incorrect and the design rationale is flawed. …”
    Get full text
    Article
  6. 646

    IVIM-DWI-based radiomic model for preoperative prediction of hepatocellular carcinoma differentiation by ZHUANG Yuxiang, LI Xiaofeng, ZHOU Daiquan

    Published 2024-10-01
    “…Support vector machine (SVM), logistic regression (LR) and random forest (RF) algorithms were utilized to construct different image omics models. …”
    Get full text
    Article
  7. 647

    Policy Evolution of Government Procurement of Public Services in China: A Text-Mining Perspective by Dongdan Zhu, Yuting Zhang, Zhengnan Lu

    Published 2023-01-01
    “…Secondly, the TF-IDF algorithm is adopted to obtain keywords at each stage, and the static stage characteristics are summarized by constructing the complex network of the extracted keywords. …”
    Get full text
    Article
  8. 648

    Cross-Domain Recommendation Algorithm Based on Latent Factor Model by Sheng Gao, Siting Ren, Jun Guo

    Published 2015-07-01
    “…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
    Get full text
    Article
  9. 649

    The Morphological Classification of Galaxy Clusters: Algorithms for Applying the Numerical Criteria by Elena Panko

    Published 2025-07-01
    “…All algorithms are realized in the “Cluster Cartography” tool and can be used with data taken from different catalogs. …”
    Get full text
    Article
  10. 650

    Quantification and Evolution of Online Public Opinion Heat Considering Interactive Behavior and Emotional Conflict by Zhengyi Sun, Deyao Wang, Zhaohui Li

    Published 2025-06-01
    “…To address these issues, first, this study addressed the complexity of interaction behaviors by introducing an approach that employs the information gain ratio as a weighting indicator to measure the “interaction heat” contributed by different interaction attributes during event evolution. …”
    Get full text
    Article
  11. 651

    Smooth likelihood-based collision avoidance for polygon shaped and differential drive vehicles by Yang Zhou, Linjie Kong

    Published 2025-07-01
    “…The proposed Smooth Likelihood-based Collision Avoidance (SLBCA) algorithm is robust and enables real-time optimization-based trajectory planning. …”
    Get full text
    Article
  12. 652

    Tuning and Comparison of Optimization Algorithms for the Next Best View Problematic by Everardo Shain-Ruvalcaba, Efrain Lopez-Damian

    Published 2024-01-01
    “…The aim of this paper is to tune and compare different optimization algorithms on the Next Best View (NBV) problem, which consists in finding the next position that the sensor or camera needs to take to scan an object or scenery in its totality. …”
    Get full text
    Article
  13. 653

    Quasiparticle Cooling Algorithms for Quantum Many-Body State Preparation by Jerome Lloyd, Alexios A. Michailidis, Xiao Mi, Vadim Smelyanskiy, Dmitry A. Abanin

    Published 2025-03-01
    “…In this work, we develop a kinetic-theory framework to describe quasiparticle cooling dynamics, and employ it to compare the efficiency of different cooling algorithms. In particular, we introduce a protocol where coupling to auxiliaries is modulated in time to minimize heating processes, and demonstrate that it allows a high-fidelity preparation of ground states in different quantum phases. …”
    Get full text
    Article
  14. 654

    Psychosemantic approach as the basis for the algorithmization technology of processing educational information by Elena V. Tsupikova, Margarita V. Tsyguleva

    Published 2021-10-01
    “…Semantic principles (matching of logical and linguistic categories, considering the text from the inner and outer speech, considering the text as cognitive and communicative essence; differentiation between the meaning and sense as between the semantics of the outer speech and the semantics of thinking; identification of semantic relationships between information elements, etc.), psychological and pedagogical principles (self-reflection support of learning activity; self-motivation due to determining usefulness and applicability of information; self-organization of students while creating their own algorithms of learning activity, etc.), and psycholinguistic principles (building logical supporting schemes, analogues of universal subject codes; semantic evaluation of the quantitative and qualitative characteristics of information, etc.)of work with scientific and educational profession-oriented information are described and correlated with the learning content and mechanisms of students verbal and cognitive activity. …”
    Get full text
    Article
  15. 655
  16. 656

    Vulnerability benchmark generation algorithm based on finite state machines by XIE Yuandong, YAN Xuexiong, ZHAO Guangsheng, ZHAO Xu, QIU Han

    Published 2025-06-01
    “…Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. This study validates the algorithm’s effectiveness and practical utility, confirming that it provides a more comprehensive and realistic benchmark for evaluating vulnerability detection tools.…”
    Get full text
    Article
  17. 657

    Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification by Pouya Koureh Davoodi, Farnusch Hajizadeh, Mohammad Rezaei

    Published 2025-08-01
    “…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
    Get full text
    Article
  18. 658

    Realization and discussion of selected artificial intelligence algorithms in computer games by Yurii Tyshchenko

    Published 2025-03-01
    “…The aim is to evaluate the efficiency and learning ability across different scenarios, such as Blackjack and Poker Limit Hold'em. …”
    Get full text
    Article
  19. 659

    Robust UAV Target Tracking Algorithm Based on Saliency Detection by Hanqing Wu, Weihua Wang, Gao Chen, Xin Li

    Published 2025-04-01
    “…Firstly, this article analyzes the features from both spatial and temporal dimensions, evaluates the representational and discriminative abilities of different features, and achieves adaptive feature fusion. …”
    Get full text
    Article
  20. 660

    Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement by Mohammad Ismail, Zohair Al-Ameen

    Published 2022-06-01
    “…Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. …”
    Get full text
    Article