Showing 641 - 660 results of 5,195 for search '(differential OR different) evaluation algorithm', query time: 0.21s Refine Results
  1. 641
  2. 642

    Enhancing PV feed-in power forecasting through federated learning with differential privacy using LSTM and GRU by Pascal Riedel, Kaouther Belkilani, Manfred Reichert, Gerd Heilscher, Reinhold von Schwerin

    Published 2024-12-01
    “…Consequently, federated LSTM and GRU models are compared with centralized and local baseline models using rolling 5-fold cross-validation to evaluate their respective performances. By leveraging advanced FL algorithms such as FedYogi and FedAdam, we propose a method that not only predicts sequential energy data with high accuracy, achieving an R2 of 97.68%, but also adheres to stringent privacy standards, offering a scalable solution for the challenges of smart grids analytics, thus clearly showing that the proposed approach is promising and worth being pursued further.…”
    Get full text
    Article
  3. 643

    New Method for Solving Substation Expansion Planning Problem Using Fuzzy Clustering Algorithms by Zahra Moravej, Hossein Kiani Rad

    Published 2024-02-01
    “…At first, each algorithm is introduced and the differences are characterized. …”
    Get full text
    Article
  4. 644

    A Random Traffic Assignment Model for Networks Based on Discrete Dynamic Bayesian Algorithms by Wei Zhou

    Published 2022-01-01
    “…We study the implementation of traffic assignment engineering in conjunction with the network stochastic model: first, we study the Bayesian algorithm theoretical model of control layer stripping in the network based on the discrete dynamic Bayesian algorithm theory and analyze the resource-sharing mechanism in different queuing rules; second, we study the extraction and evaluation theory of traffic assignment for the global view obtained by the control layer of the network and establish the Bayesian algorithm analysis model based on the traffic assignment; subsequently, the routing of bandwidth guarantee and delay guarantee in the network is studied based on Bayesian algorithm model and Bayesian algorithm network random traffic allocation theory. …”
    Get full text
    Article
  5. 645

    Integration of Machine Learning and Wavelet Algorithms for Processing Probing Signals: An Example of Oil Wells by Zukhra Abdiakhmetova, Zhanerke Temirbekova

    Published 2025-01-01
    “…Furthermore, machine learning models, including standard regression algorithms and neural networks, are leveraged to enhance signal interpretation and predictive capabilities. …”
    Get full text
    Article
  6. 646

    The impact of intravenous iodinated contrast agents on radiotherapy dose calculation and radiobiological effect predictions in central lung cancer by Defu Yang, Feng Shang, Ying Xu, Ying Yan

    Published 2025-08-01
    “…This study evaluates and compares dosimetric differences and predictions of Tumor Control Probability (TCP) and Normal Tissue Complication Probability (NTCP) between the Analytic Anisotropic Algorithm (AAA) and Acuros XB (AXB) algorithm in lung cancer radiotherapy, under both contrast-enhanced and non-contrast enhanced CT conditions.MethodsTwenty patients with centralized lung cancer treated with intensity-modulated radiation therapy (IMRT) technique, including two patients with small cell lung cancer and 18 with non-small cell lung cancer, were selected to undergo CT scanning with and without contrast. …”
    Get full text
    Article
  7. 647

    Contrast Study of Low Tube Current Combined with Deep Learning Algorithms in Paranasal Sinus CT Imaging by Yufei SUN, Zhaohui ZHONG, Xiangming LI, Wanbo ZHOU, Chensi XU, Miao DENG, Lixin ZHANG

    Published 2025-05-01
    “…Objective: To explore the application effect of a low tube current combined with a deep learning algorithm in paranasal sinus computed tomography (CT) imaging and to evaluate its advantages in terms of image quality and radiation dose. …”
    Get full text
    Article
  8. 648

    Evaluation of GLOCK 9 mm Firing Pin Aperture Shear Mark Individuality Based on 3,156 Different Pistols (Manufactured Over a 30 Year Period in Two Countries) Using Additional Patter... by James E. Hamby, Eric Warren, Stephen Norris, Nicholas D.K. Petraco

    Published 2024-07-01
    “…Over a period of 30 years, a number of fired GLOCK cartridge cases have been evaluated. A total of 3156 GLOCK firearms were used to generate a sample of the same size. …”
    Get full text
    Article
  9. 649

    Handwritten Words Image Character Extraction Adaptive Algorithm Based on the Multi-branch Structure by GUO Xiaojing, ZHAO Xiaoyuan, ZOU Songlin

    Published 2025-05-01
    “…Higher identification precision and efficiency serve as reference indices for evaluating the model. The improved RMCA algorithm applies four branches in the initial layers, which differs from the original re-parameterized structure. …”
    Get full text
    Article
  10. 650
  11. 651

    How can Multi-Agents AI Systems help Reduce Biases in Trading Algorithms? by Florin GROSU

    Published 2025-05-01
    “…However, algorithmic trading is still accompanied by cognitive and algorithmic biases such as overconfidence, confirmation bias, and anchoring effects that can result in suboptimal decisions and higher levels of risk. …”
    Get full text
    Article
  12. 652

    APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS by Pham Nguyen Huy Phuong, Dang Le Nam

    Published 2013-06-01
    “…Nowadays, developing and evaluating pattern matching algorithms for the identification of network-attack has been constantly evolving. …”
    Get full text
    Article
  13. 653

    A parallel multi-objective genetic algorithm for scheduling scientific workflows in cloud computing by Muhammad Sardaraz, Muhammad Tahir

    Published 2020-08-01
    “…The proposed algorithm is evaluated with benchmark datasets and comparative results with the standard genetic algorithm, particle swarm optimization, and specialized scheduler are presented. …”
    Get full text
    Article
  14. 654

    Fuzzy operator infrared image deblurring algorithm for image blurring in dragon boat races by Xiao Tang, Yuan Shen, Genwei Zhu

    Published 2024-12-01
    “…For a blurry image with 19 pixels, the number of blurry pixels extracted by the research algorithm was 22, with a difference of 3 pixels. For a blurry image with 35 pixels, the algorithm extracted 34 blurry pixels, with a difference of 1 pixel. …”
    Get full text
    Article
  15. 655

    A multi objective collaborative reinforcement learning algorithm for flexible job shop scheduling by Jian Li, Shifa Li, Pengbo He, Huankun Li

    Published 2025-07-01
    “…Using hypervolume, set coverage and inverted generational distance as evaluation metrics, the algorithm is compared with those proposed in other studies on standard instances. …”
    Get full text
    Article
  16. 656

    A Feature Weighted Fuzzy Clustering Algorithm Based on Multistrategy Grey Wolf Optimization by Yongli Liu, Zhonghui Wang, Hao Chao

    Published 2021-01-01
    “…This algorithm cannot only improve clustering accuracy by considering the different importance of features and assigning each feature different weight but also can easily obtain the global optimal solution and avoid the impact of the initialization process by implementing multistrategy grey wolf optimization. …”
    Get full text
    Article
  17. 657

    Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method by S. V. Razumnikov

    Published 2025-01-01
    “…The Electre I method allows one to evaluate the relative advantages and disadvantages of different cloud computing areas based on a set of criteria. …”
    Get full text
    Article
  18. 658

    Structural Damage Identification Based on the Wavelet Transform and Improved Particle Swarm Optimization Algorithm by Jia Guo, Deqing Guan, Jianwei Zhao

    Published 2020-01-01
    “…To evaluate the performance of IPSO, the standard particle swarm optimization algorithm with an inertia weight factor of 0.8 (0.8PSO), the genetic algorithm (GA), and the bat algorithm (BA) are also considered. …”
    Get full text
    Article
  19. 659

    Assessing the Performance of DWT-PCA/SVD Face Recognition Algorithm under Multiple Constraints by Joseph Agyapong Mensah, Louis Asiedu, Felix O. Mettle, Samuel Iddi

    Published 2021-01-01
    “…Numerical evaluation of the study algorithm gave reasonably average recognition rates of 77.31% and 76.85% for left and right reconstructed face images with varying expressions, respectively. …”
    Get full text
    Article
  20. 660