-
781
Leveraging Evolutionary Algorithms for Feasible Hexapod Locomotion Across Uneven Terrain
Published 2022-05-01“…Here, we leveraged this class of algorithms to evolve a stable hexapod gait controller capable of traversing uneven terrain and obstacles. …”
Get full text
Article -
782
Cross-validation for training and testing co-occurrence network inference algorithms
Published 2025-03-01“…We propose a novel cross-validation method to evaluate co-occurrence network inference algorithms, and new methods for applying existing algorithms to predict on test data. …”
Get full text
Article -
783
Detection algorithm of electronic disguised voice based on convolutional neural network
Published 2018-02-01“…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
Get full text
Article -
784
Dimensionality Reduction Algorithms in Machine Learning: A Theoretical and Experimental Comparison
Published 2023-12-01“…First, we discuss the theoretical foundation of a variety of FEAs from various categories like supervised vs. unsupervised, linear vs. nonlinear and random-projection-based vs. manifold-based, show their algorithms and compare these methods conceptually. Second, we determine the finest sets of new features for various datasets, as well as in terms of statistical significance, evaluate the eminence of the different types of transformed feature spaces and power analysis, and also determine the FEA efficacy in terms of speed and classification accuracy.…”
Get full text
Article -
785
A Closer Look at Invalid Action Masking in Policy Gradient Algorithms
Published 2022-05-01“…In this paper, we 1) show theoretical justification for such a practice, 2) empirically demonstrate its importance as the space of invalid actions grows, and 3) provide further insights by evaluating different action masking regimes, such as removing masking after an agent has been trained using masking.…”
Get full text
Article -
786
Sensitivity Analysis of a CPAM Inverse Algorithm for Composite Laminates Characterization
Published 2017-01-01“…The material characterization is first examined for isotropic plates under different boundary conditions to evaluate the method’s accuracy. …”
Get full text
Article -
787
Development and Validation of an Ultrasound Imaging Algorithm for Structured Reporting in Testicular Pathology
Published 2025-04-01“…Notably, strong inter-rater agreement was observed, underscoring the algorithm’s reliability across different expertise levels. …”
Get full text
Article -
788
Gaussian pulse shaping algorithm based on finite impulse response filters
Published 2024-12-01“…When performing Gaussian pulse shaping, errors introduced by hardware limitations may lead to differences in shaping results. Compared to infinite impulse response (IIR) filters, finite impulse response (FIR) filters have the advantage of being less affected by errors and more stable.PurposeThis study aims to propose a FIR filter-based Gaussian pulse shaping algorithm using impulse response functions, and realize a FPGA-based hardware implementation of this algorithm to evaluate the impact of hardware limitations on it.MethodsFirst of all, the discrete impulse response of Gaussian pulse shaping (GPS) was derived by means of impulse response invariant transformation, and shaped pulse waveforms under different quantization accuracies and truncation intervals were obtained using a computer simulation, so did that under Gaussian pulse shaping with or without additional truncation were assessed. …”
Get full text
Article -
789
A Scoring Algorithm for the Early Prediction of Academic Risk in STEM Courses
Published 2025-03-01“…The resulting scoring algorithm is distinguished by its methodological simplicity, ease of implementation, and adaptability to different educational settings, making it a practical tool for timely interventions.…”
Get full text
Article -
790
Optimal tuning of multi-PID controller using improved CMOCSO algorithm
Published 2024-11-01“…The efficacy of the algorithm is evaluated through testing on 16 standard functions, demonstrating its effectiveness in addressing constrained multi-objective problems. …”
Get full text
Article -
791
An Improved Hybrid Genetic Algorithm with a New Local Search Procedure
Published 2013-01-01“…One important challenge of a hybrid genetic algorithm (HGA) (also called memetic algorithm) is the tradeoff between global and local searching (LS) as it is the case that the cost of an LS can be rather high. …”
Get full text
Article -
792
Religious Digital Creatives in Türkiye: A Research on the Axis of Algorithmic Authority
Published 2024-12-01“…This study aims to reveal who createsreligious digital content in Türkiye, to classify the structure of the content created, and to evaluate the level ofauthority of these creators in the focus of algorithmic authority. …”
Get full text
Article -
793
Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling
Published 2025-04-01“…The similarity between different encryption levels is measured by the Pearson Coefficient to evaluate the results obtained.…”
Get full text
Article -
794
A Cluster-Based Consensus Algorithm in a Wireless Sensor Network
Published 2013-03-01“…With different DOI values, our ACDC gossip algorithm can still reach lower relative error compared with other gossip algorithms, which demonstrates that our algorithm is robust enough to be executed in the network.…”
Get full text
Article -
795
Validation of Material Algorithms for Femur Remodelling Using Medical Image Data
Published 2017-01-01“…The aim of this study is the utilization of human medical CT images to quantitatively evaluate two sorts of “error-driven” material algorithms, that is, the isotropic and orthotropic algorithms, for bone remodelling. …”
Get full text
Article -
796
An algorithm to generate correlated input-parameters to be used in probabilistic sensitivity analyses
Published 2021-01-01“…The algorithm was implemented in an HZ CEA model and evaluated for gamma and beta distributions. …”
Get full text
Article -
797
Received value flipping based sphere decoding algorithm for polar codes
Published 2024-12-01“…In addition, we also compare the performance of different flipping sets and evaluate the influence of the associated flipping set sizes. …”
Get full text
Article -
798
Research on the Application of Deep Learning Algorithm in the Damage Detection of Steel Structures
Published 2025-01-01Get full text
Article -
799
Masterpiece Optimization Algorithm: A New Method for Solving Engineering Problems
Published 2025-01-01“…Now, to handle this content, in the first iteration of the proposed algorithm, different points in the answer zone are introduced for the MPF. …”
Get full text
Article -
800
NECTAR-An Agent-Based Dynamic Task Allocation Algorithm in the UAV Swarm
Published 2020-01-01“…In addition, we introduce a novel agent-based allocating mechanism based on the auction process, including the design for three kinds of agents and the cooperation mechanism among different agents. Moreover, we proposed a new algorithm to calculate the bidding values of UAVs, by which the messages passed between UAVs can be reduced. …”
Get full text
Article