Showing 561 - 580 results of 5,195 for search '(differential OR different) evaluation algorithm', query time: 0.25s Refine Results
  1. 561

    Problems of Algorithms Development to Determine Quality of Topic Models Ensembles for Make Rubricators by A. P. Shiryaev, A. R. Fedorov, P. A. Fedorov, L. G. Gagarina, E. M. Portnov

    Published 2018-09-01
    “…This article describes the usage of a voting algorithm, which is based on a group of different evaluation algorithms. …”
    Get full text
    Article
  2. 562

    Numerical approximation for algorithmic tangent moduli for nonlinear viscoelastic model with CSDA method by Xinggui Fan, Jinsheng Xu, Xiong Chen

    Published 2024-08-01
    “…After that, the idea of the CSDA is put to use in order to carry out a numerical evaluation of the algorithmic tangent moduli of a viscoelastic constitutive model. …”
    Get full text
    Article
  3. 563

    Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm by Wei Han, Hong-Hua Wang, Ling Chen

    Published 2014-01-01
    “…In addition to the regular operation, a mutation operator (MO) is designed to enhance the searching performance of the algorithm. The feasibility of the proposed method is demonstrated by various parameters of PV module under different environmental conditions, and the testing results are compared with other studied methods in terms of final solutions and computational time. …”
    Get full text
    Article
  4. 564

    Robust Corner Detection Using Local Extrema Differences by Reza Yazdi, Hassan Khotanlou, Hosna Khademfar

    Published 2024-01-01
    “…Our approach leverages a unique corner response function derived from intensity sorting and difference calculations. We conduct a comprehensive evaluation comparing our detector to seven established algorithms using five benchmark images with ground truth corner locations. …”
    Get full text
    Article
  5. 565
  6. 566

    Comparative Study of Swarm-Based Algorithms for Location-Allocation Optimization of Express Depots by Yong-Wei Zhang, Qin Xiao, Xue-Ying Sun, Liang Qi

    Published 2022-01-01
    “…Numerical examples with up to 50 delivery points show that the proposed encoding scheme boosts the performance of all algorithms without altering any operator of the algorithm.…”
    Get full text
    Article
  7. 567

    Overcoming Stagnation in Metaheuristic Algorithms with MsMA’s Adaptive Meta-Level Partitioning by Matej Črepinšek, Marjan Mernik, Miloš Beković, Matej Pintarič, Matej Moravec, Miha Ravber

    Published 2025-05-01
    “…Stagnation remains a persistent challenge in optimization with metaheuristic algorithms (MAs), often leading to premature convergence and inefficient use of the remaining evaluation budget. …”
    Get full text
    Article
  8. 568

    Random Walk‐Based GOOSE Algorithm for Solving Engineering Structural Design Problems by Sripathi Mounika, Himanshu Sharma, Aradhala Bala Krishna, Krishan Arora, Syed Immamul Ansarullah, Ayodeji Olalekan Salau

    Published 2025-05-01
    “…These benchmarks provide a diverse range of optimization landscapes, enabling comprehensive evaluation of IGOOSE algorithm performance under different problem complexities. …”
    Get full text
    Article
  9. 569

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  10. 570

    A Novel Hierarchical Clustering Algorithm Based on Density Peaks for Complex Datasets by Rong Zhou, Yong Zhang, Shengzhong Feng, Nurbol Luktarhan

    Published 2018-01-01
    “…Clustering aims to differentiate objects from different groups (clusters) by similarities or distances between pairs of objects. …”
    Get full text
    Article
  11. 571

    Motion Planning and Tracking Control of Autonomous Vehicle Based on Improved A∗ Algorithm by Yunlong Bai, Gang Li, Ning Li

    Published 2022-01-01
    “…The resultant force generated by each potential field is further introduced into the evaluation function of A∗ algorithm to plan the driving path, which could be suitable for autonomous vehicles. …”
    Get full text
    Article
  12. 572

    Radiological Semiotics of Different Types of Nontuberculous Pulmonary Mycobacterioses by R. B. Amansakhedov, L. I. Dmitrieva, T. G. Smirnova, A. D. Egorova, A. E. Ergeshov

    Published 2022-07-01
    “…Objective: to determine, evaluate, and describe different radiological patterns of microbiologically identified nontuberculous pulmonary mycobacterioses (NTPM) based on multislice computed tomography data.   …”
    Get full text
    Article
  13. 573

    Exploration and comparison of the effectiveness of swarm intelligence algorithm in early identification of cardiovascular disease by Tiantian Bai, Mengru Xu, Taotao Zhang, Xianjie Jia, Fuzhi Wang, Xiuling Jiang, Xing Wei

    Published 2025-02-01
    “…This study systematically evaluated the performance of each feature selection algorithm under different population sizes, specifically by comparing their average running time and objective function values to identify the optimal feature subset. …”
    Get full text
    Article
  14. 574

    MOBCSA: Multi-Objective Binary Cuckoo Search Algorithm for Features Selection in Bioinformatics by Hudhaifa Mohammed Abdulwahab, S. Ajitha, Mufeed Ahmed Naji Saif, Belal Abdullah Hezam Murshed, Fahd A. Ghanem

    Published 2024-01-01
    “…To assess MOBCSA&#x2019;s performance, evaluation experiments were conducted on six benchmark biomedical datasets using three different classifiers. …”
    Get full text
    Article
  15. 575

    Outlier Detection of Photovoltaic Power Generation System Data Based on GMM-IF Algorithm by Xin Li, Guoxin Du, Yuman Li, Zengqiang Ma, Lihu Liu, Minglong Jiang, Feiyu Liu, Tianming Mu

    Published 2025-01-01
    “…Additionally, it integrates an Isolation Forest (IF) as the decision-making mechanism for detailed detection, further enhancing detection accuracy. Under different operating conditions and actual photovoltaic array datasets, comparative experiments were conducted using different evaluation metrics and algorithms to verify the effectiveness and superiority of the GMM-IF algorithm. …”
    Get full text
    Article
  16. 576

    Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks by Zhi-qiang Zou, Ze-ting Li, Shu Shen, Ru-chuan Wang

    Published 2016-02-01
    “…Furthermore, we study three different greedy algorithms under DAF_CSOR. Results of evaluation experiments show that the proposed sparsity-adaptive DAF_CSOR is relatively optimal in terms of recovery accuracy. …”
    Get full text
    Article
  17. 577

    Multi-Dimensional Feature Fusion and Enhanced Attention Streaming Movie Prediction Algorithm by Hanqing Hu, Tianmu Tian, Chengjing Liu, Xueyuan Bai

    Published 2025-05-01
    “…The experimental results show that the proposed algorithm FFLSTMEA achieves better prediction results with an average absolute error (MAE) of 3.50, a root mean square error (RMSE) of 5.28, and a coefficient of determination (R-squared) of 0.87 in the evaluation index. …”
    Get full text
    Article
  18. 578

    Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection by Marwan Haruna, Kaleb Gebremichael Gebremeskel, Martina Troscia, Alexandr Tardo, Paolo Pagano

    Published 2024-10-01
    “…This paper proposes an approach that operates on two different levels to address cybersecurity. On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
    Get full text
    Article
  19. 579

    Sitting Posture Detection and Classification Using Machine Learning Algorithms on RapidMiner by Chawakorn Sri-ngernyuang, Prakrankiat Youngkong, Jinpitcha Mamom, Duangruedee Lasuka

    Published 2025-06-01
    “…In this study, a cushion pad with a pressure sensor implanted that can recognize and classify different postures using machine learning techniques is developed and evaluated. …”
    Get full text
    Article
  20. 580

    Automated Food Weight and Content Estimation Using Computer Vision and AI Algorithms by Bryan Gonzalez, Gonzalo Garcia, Sergio A. Velastin, Hamid GholamHosseini, Lino Tejeda, Gonzalo Farias

    Published 2024-11-01
    “…An RGB camera is employed to capture the tray delivery process in a self-service restaurant, providing test images for plate counting and content identification algorithm comparison, using standard evaluation metrics. …”
    Get full text
    Article