Search alternatives:
reduction » education (Expand Search)
Showing 15,501 - 15,520 results of 17,151 for search '(prediction OR reduction) algorithms', query time: 0.28s Refine Results
  1. 15501

    Re-identification assistance and multi-stage association for pedestrian multi-object tracking by Ye Li, Li Zhan, Lei Wu, Hongkun Liu, Jianli Min, Xinzhong Wang

    Published 2025-07-01
    “…Then, based on the Intersection over Union (IoU) between the predicted bounding box and the detection bounding box, the Hungarian algorithm is used to match the targets between frames. …”
    Get full text
    Article
  2. 15502

    State of Charge Estimation on Lithium-Ion Batteries Using Particle Swarm Optimization Method by Muhammad Ridho Dewanto, Riza Hadi Saputra, Kharis Sugiarto, Agung Adi Saputra

    Published 2025-04-01
    “…The high accuracy of 87.972% of PSO also shows that this method is reliable for applications that require precise SoC predictions. It is hoped that the results of this research can become a basis for further research in the field of battery management and metaheuristic algorithm optimization. …”
    Get full text
    Article
  3. 15503

    Collaborative Forecasting of Multiple Energy Loads in Integrated Energy Systems Based on Feature Extraction and Deep Learning by Zhe Wang, Jiali Duan, Fengzhang Luo, Xiaoyu Qiu

    Published 2025-02-01
    “…First, the complete ensemble empirical mode decomposition with adaptive noise algorithm decomposes load data, and a dynamic time warping-based k-medoids clustering algorithm reconstructs subsequences aligned with system load components. …”
    Get full text
    Article
  4. 15504

    System Development for Liquid Chemicals Point Injection Based on Convolutional Neural Network Models by V. S. Semenyuk, E. A. Nikitin

    Published 2021-06-01
    “…They showed that the predicted error on the validation data was 0.18758. …”
    Get full text
    Article
  5. 15505

    Molecular sub-classification of renal epithelial tumors using meta-analysis of gene expression microarrays. by Thomas Sanford, Paul H Chung, Ariel Reinish, Vladimir Valera, Ramaprasad Srinivasan, W Marston Linehan, Gennady Bratslavsky

    Published 2011-01-01
    “…These signatures were organized into an algorithm to sub-classify renal neoplasms. The use of these signatures according to our algorithm was validated on several independent datasets.…”
    Get full text
    Article
  6. 15506

    Detection of Multiple Small Biased GPS Spoofing Attacks on Autonomous Vehicles Using Time Series Analysis by Ahmad Mohammadi, Reza Ahmari, Vahid Hemmati, Frederick Owusu-Ambrose, Mahmoud Nabil Mahmoud, Parham Kebria, Abdollah Homaifar

    Published 2025-01-01
    “…This detection is facilitated through time series analysis at 25 and 50 s intervals to build a profile of data errors and distribution to predict the probability of such attacks. To evaluate the algorithm's effectiveness, five different test datasets depicting four types of spoofing scenarios—turn-by-turn, overshoot, stop, and multiple small biased attacks—were created using data from the publicly accessible Honda Research Institute Driving Dataset (HDD). …”
    Get full text
    Article
  7. 15507

    Tire Pressure Monitoring System Using Feature Fusion and Family of Lazy Classifiers by Arpit Pandey, Sridharan Naveen Venkatesh, Prabhakaranpillai Sreelatha Anoop, B. R. Manju, Vaithiyanathan Sugumaran

    Published 2025-01-01
    “…Empirically, the research achieved 97.92% accuracy using the local weighted learning (LWL) algorithm, demonstrating the effectiveness of combined statistical, histogram, and ARMA features in enhancing TPMS predictive capabilities.…”
    Get full text
    Article
  8. 15508

    Feature-Based Classification of Amino Acid Substitutions outside Conserved Functional Protein Domains by Branislava Gemovic, Vladimir Perovic, Sanja Glisic, Nevena Veljkovic

    Published 2013-01-01
    “…The new algorithm is based on the informational spectrum method (ISM), a feature-based technique, and statistical analysis. …”
    Get full text
    Article
  9. 15509

    An Approach to Finding a Robust Deep Learning Model by Alexey Boldyrev, Fedor Ratnikov, Andrey Shevelev

    Published 2025-01-01
    “…This approach, supplemented with a model selection algorithm designed as a meta-algorithm, is versatile and applicable to any machine learning model, provided that it is appropriate for the task at hand. …”
    Get full text
    Article
  10. 15510

    Slewing and Active Vibration Control of a Flexible Single-Link Manipulator by Dae W. Kim, Moon K. Kwak, Soo-Min Kim, Brian F. Feeny

    Published 2025-01-01
    “…This research encompasses dynamic modeling, slewing control, and vibration control for the system. Theoretical predictions are compared with experimental results to validate both the theoretical model and the proposed vibration control algorithm.…”
    Get full text
    Article
  11. 15511

    A Hybrid Grey Based KOHONEN Model and Biogeography-Based Optimization for Project Portfolio Selection by Farshad Faezy Razi, Abbas Toloie Eshlaghy, Jamshid Nazemi, Mahmood Alborzi, Alireza Pourebrahimi

    Published 2014-01-01
    “…Next, each portfolio was evaluated using grey relational analysis (GRA) and then scheduled risk of the project was predicted using Mamdani fuzzy inference method. Finally, the multiobjective biogeography-based optimization algorithm was utilized for drawing risk and rank Pareto analysis. …”
    Get full text
    Article
  12. 15512

    Ability of verbal autopsy data to detect deaths due to uncontrolled hyperglycaemia: testing existing methods and development and validation of a novel weighted score by Justine I Davies, David Beran, Miles D Witham, Alisha N Wade, Amelia Crampin, Sarah Blackstock, Graham D Ogle

    Published 2019-10-01
    “…There were 8699 relevant deaths in Agincourt and 1663 in Karonga.Results Of the Agincourt deaths, there were 77 study physician classified cases and 58 computer algorithm classified cases. Agreement between study physician classified cases and computer algorithm classified cases was poor (Cohen’s kappa 0.14). …”
    Get full text
    Article
  13. 15513

    Integrated systems biology analysis of KSHV latent infection reveals viral induction and reliance on peroxisome mediated lipid metabolism. by Zoi E Sychev, Alex Hu, Terri A DiMaio, Anthony Gitter, Nathan D Camp, William S Noble, Alejandro Wolf-Yadlin, Michael Lagunoff

    Published 2017-03-01
    “…To identify the underlying cellular mechanisms of KSHV alteration of host signaling and endothelial cell activation, we identified changes in the host proteome, phosphoproteome and transcriptome landscape following KSHV infection of endothelial cells. A Steiner forest algorithm was used to integrate the global data sets and, together with transcriptome based predicted transcription factor activity, cellular networks altered by latent KSHV were predicted. …”
    Get full text
    Article
  14. 15514

    THE MODEL OF FORECASTING THE EXCHANGE RATE OF THE RUBLE IN OPERATIONAL PLANNING AND MANAGEMENT FINANCIAL AND ECONOMIC ACTIVITY by Alexander Gladilin, Olga Gridina

    Published 2022-05-01
    “…It is recommended that the author's algorithm of calculation of the sustainability and adequacy of the obtained characteristics.…”
    Get full text
    Article
  15. 15515

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  16. 15516

    Measuring Respiration Rate from Speech by Sidharth Abrol, Biswajit Das, Srikanth Nallanthighal, Okke Ouweltjes, Ulf Grossekathofer, Aki Härmä

    Published 2025-02-01
    “…The best model shows the predicted respiration rate from speech within ±3 BPM for 82% of test subjects. …”
    Get full text
    Article
  17. 15517

    Research on the invulnerability of regional network based on topology analysis by Changqing AN, Yujia LIU, Hui WANG, Zhiyan ZHENG, Tao YU, Jilong WANG

    Published 2021-11-01
    “…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
    Get full text
    Article
  18. 15518

    Multifactor Stock Selection Strategy Based on Machine Learning: Evidence from China by Jieying Gao, Huan Guo, Xin Xu

    Published 2022-01-01
    “…The main findings are as follows: the support vector regression has the most stable successful rate for predicting, while ridge regression and linear regression have the most unstable successful rate with more extreme cases; algorithm of support vector regression fitting higher-degree polynomials in Chinese A-share market is optimized, compared with the traditional linear regression both in terms of stock return and retracement control; the results of support vector regression significantly outperforming the CSI 500 index prove further.…”
    Get full text
    Article
  19. 15519

    Optimal transport reveals dynamic gene regulatory networks via gene velocity estimation. by Wenjun Zhao, Erica Larschan, Björn Sandstede, Ritambhara Singh

    Published 2025-05-01
    “…Our algorithm overcomes this limitation by estimating gene velocities using optimal transport. …”
    Get full text
    Article
  20. 15520

    Ga-based MPC for satellite’s attitude and orbit control by Prasitthichai Naronglerdrit, Manukid Parnichkun

    Published 2025-07-01
    “…We propose a novel method that utilizes a nonlinear control strategy optimized by a Genetic Algorithm (GA) in conjunction with Model Predictive Control (MPC), focusing on managing both attitude and orbit simultaneously. …”
    Get full text
    Article