Showing 661 - 680 results of 5,881 for search '(differential OR different) (evolution OR evaluation) algorithm', query time: 0.26s Refine Results
  1. 661
  2. 662

    A Reliable Application of MPC for Securing the Tri-Training Algorithm by Hendra Kurniawan, Masahiro Mambo

    Published 2023-01-01
    “…The simulation results show that tri-training in secure MPC has almost same accuracy compared to original tri-training algorithm. We also compare execution time in addition to performance evaluation of tri-training in secure and the original tri-training algorithms.…”
    Get full text
    Article
  3. 663

    Firefly Algorithm based Feature Selection for Arabic Text Classification by Souad Larabi Marie-Sainte, Nada Alalyani

    Published 2020-03-01
    “…This algorithm has been successfully applied in different combinatorial problems. …”
    Get full text
    Article
  4. 664

    Enhancing breast cancer diagnosis through machine learning algorithms by Javad Amraei, Aboulfazl Mirzapoor, Kiomars Motarjem, Mohammad Abdolahad

    Published 2025-07-01
    “…In this research has done extensive algorithm evaluation like SVM, DT, RF, Logistic regression, KNN and ANN using datasets CDP Breast Cancer. …”
    Get full text
    Article
  5. 665

    Human activity recognition algorithms for manual material handling activities by Andreas Sochopoulos, Tommaso Poliero, Jamil Ahmad, Darwin G. Caldwell, Christian Di Natali

    Published 2025-03-01
    “…HAR using IMUs can aid both the ergonomic evaluation of the performed activities and, more recently, with the development of exoskeleton technologies, can assist with the selection of precisely tailored assisting strategies. …”
    Get full text
    Article
  6. 666

    Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm by Youle Song, Yuting Duan, Tong Rao

    Published 2025-07-01
    “…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
    Get full text
    Article
  7. 667

    A lightweight 256 hexadecimal character substitution Cipher algorithm by Ibrahim Lawal, Musa Yusuf, Adamu Sulaiman Usman, Oluwasegun Ishaya Adelaiye

    Published 2025-07-01
    “…The aim of this study was achieved by the following objectives; a design of the HCSC algorithm, an implementation of the proposed HCSC algorithm using python programming language and the evaluation of its performance in comparison with existing study. …”
    Get full text
    Article
  8. 668
  9. 669

    Adaptive dynamic ϵ-simulated annealing algorithm for tumor immunotherapy by Xiaoyan Sun, Xiaoyan Sun, Ying Jiang

    Published 2025-06-01
    “…The algorithm is applied to an improved tumor immunotherapy model (ITIT), formulated using ordinary differential equations (ODEs) based on established experimental and clinical studies. …”
    Get full text
    Article
  10. 670
  11. 671
  12. 672

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
    Get full text
    Article
  13. 673

    SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm by Mujdat Soyturk, Deniz Turgay Altilar

    Published 2012-02-01
    “…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
    Get full text
    Article
  14. 674

    New Photoplethysmographic Signal Analysis Algorithm for Arterial Stiffness Estimation by Kristjan Pilt, Rain Ferenets, Kalju Meigas, Lars-Göran Lindberg, Kristina Temitski, Margus Viigimaa

    Published 2013-01-01
    “…The “ageing index” (AGI), which is calculated from the second derivative photoplethysmographic (SDPPG) waveform, has been used as one method for arterial stiffness estimation and the evaluation of cardiovascular ageing. In this study, the new SDPPG analysis algorithm is proposed with optimal filtering and signal normalization in time. …”
    Get full text
    Article
  15. 675

    RLS-Based Control Algorithms for 3D Zones of Quiet by Małgorzata I. MICHALCZYK, Janusz SERWIN

    Published 2008-12-01
    “…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
    Get full text
    Article
  16. 676

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  17. 677

    Improved Image Compression Scheme Using Hybrid Encoding Algorithm by Yusra Ahmed Salih, Aree Ali Mohammed, Loay Edwar George

    Published 2019-10-01
    “…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
    Get full text
    Article
  18. 678

    Topology of Complex Networks and Performance Limitations of Community Detection Algorithms by Muhammad Qasim Pasta, Faraz Zaidi

    Published 2017-01-01
    “…In this paper, we attempt to highlight this problem by studying networks with different topologies and evaluate the performance of community detection algorithms in the light of these topological changes. …”
    Get full text
    Article
  19. 679

    APPLICATION OF THE WORD2VEC ALGORITHM FOR CLINICAL DIAGNOSIS DETERMINATION by Uzeyir Gurbanli

    Published 2025-02-01
    “…It also focuses on evaluating the quality of diagnostic and treatment processes through applıcation of different methods and practical application. …”
    Get full text
    Article
  20. 680

    Applying of Kutter-Jordan-Bossen steganography algorithm to video sequences by N. V. Lysenko, G. M. Labkov

    Published 2015-08-01
    “…The influence of different types of noise on the algorithm stability is evaluated. …”
    Get full text
    Article