-
561
Problems of Algorithms Development to Determine Quality of Topic Models Ensembles for Make Rubricators
Published 2018-09-01“…This article describes the usage of a voting algorithm, which is based on a group of different evaluation algorithms. …”
Get full text
Article -
562
Numerical approximation for algorithmic tangent moduli for nonlinear viscoelastic model with CSDA method
Published 2024-08-01“…After that, the idea of the CSDA is put to use in order to carry out a numerical evaluation of the algorithmic tangent moduli of a viscoelastic constitutive model. …”
Get full text
Article -
563
Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm
Published 2014-01-01“…In addition to the regular operation, a mutation operator (MO) is designed to enhance the searching performance of the algorithm. The feasibility of the proposed method is demonstrated by various parameters of PV module under different environmental conditions, and the testing results are compared with other studied methods in terms of final solutions and computational time. …”
Get full text
Article -
564
Robust Corner Detection Using Local Extrema Differences
Published 2024-01-01“…Our approach leverages a unique corner response function derived from intensity sorting and difference calculations. We conduct a comprehensive evaluation comparing our detector to seven established algorithms using five benchmark images with ground truth corner locations. …”
Get full text
Article -
565
Differences between the European and Eurasian Good Pharmacovigilance Practices
Published 2021-07-01Get full text
Article -
566
Comparative Study of Swarm-Based Algorithms for Location-Allocation Optimization of Express Depots
Published 2022-01-01“…Numerical examples with up to 50 delivery points show that the proposed encoding scheme boosts the performance of all algorithms without altering any operator of the algorithm.…”
Get full text
Article -
567
Overcoming Stagnation in Metaheuristic Algorithms with MsMA’s Adaptive Meta-Level Partitioning
Published 2025-05-01“…Stagnation remains a persistent challenge in optimization with metaheuristic algorithms (MAs), often leading to premature convergence and inefficient use of the remaining evaluation budget. …”
Get full text
Article -
568
Random Walk‐Based GOOSE Algorithm for Solving Engineering Structural Design Problems
Published 2025-05-01“…These benchmarks provide a diverse range of optimization landscapes, enabling comprehensive evaluation of IGOOSE algorithm performance under different problem complexities. …”
Get full text
Article -
569
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
570
A Novel Hierarchical Clustering Algorithm Based on Density Peaks for Complex Datasets
Published 2018-01-01“…Clustering aims to differentiate objects from different groups (clusters) by similarities or distances between pairs of objects. …”
Get full text
Article -
571
Motion Planning and Tracking Control of Autonomous Vehicle Based on Improved A∗ Algorithm
Published 2022-01-01“…The resultant force generated by each potential field is further introduced into the evaluation function of A∗ algorithm to plan the driving path, which could be suitable for autonomous vehicles. …”
Get full text
Article -
572
Radiological Semiotics of Different Types of Nontuberculous Pulmonary Mycobacterioses
Published 2022-07-01“…Objective: to determine, evaluate, and describe different radiological patterns of microbiologically identified nontuberculous pulmonary mycobacterioses (NTPM) based on multislice computed tomography data. …”
Get full text
Article -
573
Exploration and comparison of the effectiveness of swarm intelligence algorithm in early identification of cardiovascular disease
Published 2025-02-01“…This study systematically evaluated the performance of each feature selection algorithm under different population sizes, specifically by comparing their average running time and objective function values to identify the optimal feature subset. …”
Get full text
Article -
574
MOBCSA: Multi-Objective Binary Cuckoo Search Algorithm for Features Selection in Bioinformatics
Published 2024-01-01“…To assess MOBCSA’s performance, evaluation experiments were conducted on six benchmark biomedical datasets using three different classifiers. …”
Get full text
Article -
575
Outlier Detection of Photovoltaic Power Generation System Data Based on GMM-IF Algorithm
Published 2025-01-01“…Additionally, it integrates an Isolation Forest (IF) as the decision-making mechanism for detailed detection, further enhancing detection accuracy. Under different operating conditions and actual photovoltaic array datasets, comparative experiments were conducted using different evaluation metrics and algorithms to verify the effectiveness and superiority of the GMM-IF algorithm. …”
Get full text
Article -
576
Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks
Published 2016-02-01“…Furthermore, we study three different greedy algorithms under DAF_CSOR. Results of evaluation experiments show that the proposed sparsity-adaptive DAF_CSOR is relatively optimal in terms of recovery accuracy. …”
Get full text
Article -
577
Multi-Dimensional Feature Fusion and Enhanced Attention Streaming Movie Prediction Algorithm
Published 2025-05-01“…The experimental results show that the proposed algorithm FFLSTMEA achieves better prediction results with an average absolute error (MAE) of 3.50, a root mean square error (RMSE) of 5.28, and a coefficient of determination (R-squared) of 0.87 in the evaluation index. …”
Get full text
Article -
578
Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection
Published 2024-10-01“…This paper proposes an approach that operates on two different levels to address cybersecurity. On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
Get full text
Article -
579
Sitting Posture Detection and Classification Using Machine Learning Algorithms on RapidMiner
Published 2025-06-01“…In this study, a cushion pad with a pressure sensor implanted that can recognize and classify different postures using machine learning techniques is developed and evaluated. …”
Get full text
Article -
580
Automated Food Weight and Content Estimation Using Computer Vision and AI Algorithms
Published 2024-11-01“…An RGB camera is employed to capture the tray delivery process in a self-service restaurant, providing test images for plate counting and content identification algorithm comparison, using standard evaluation metrics. …”
Get full text
Article