Search alternatives:
differential » different (Expand Search)
Showing 281 - 300 results of 972 for search 'Differential evaluation algorithm', query time: 0.17s Refine Results
  1. 281
  2. 282

    Protection Algorithm Based on Two-Dimensional Spatial Current Trajectory Image and Deep Learning for Transmission Lines Connecting Photovoltaic Stations by Panrun Jin, Jianling Liao, Wenqin Song, Xushan Zhao, Yankui Zhang

    Published 2025-05-01
    “…A data-enhanced convolutional neural network (A-CNN) based on cross-overlapping data sets is used to identify trajectory features and locate faults. After performance evaluation, the protection algorithm has the advantages of adapting to new energy access, resisting transition resistance, and robustness to current transformer (CT) saturation, and outliers.…”
    Get full text
    Article
  3. 283

    Criteria for Psychological Evaluation of Legally Relevant Emotional States of Defendants: Methodological Recommendations by F. S. Safuanov, O. F. Savina, M. V. Morozova, I. V. Isaeva

    Published 2016-09-01
    “…An algorithm of forensic psychological evaluation of the defendant's emotional states is proposed, together with examples of sample wording of expert conclusions, and their legal meaning.…”
    Get full text
    Article
  4. 284

    Interpretable multiparametric MRI radiomics-based machine learning model for preoperative differentiation between benign and malignant prostate masses: a diagnostic, multicenter st... by Wenjun Zhou, Wenjun Zhou, Zhangcheng Liu, Zhangcheng Liu, Jindong Zhang, Shuai Su, Yu Luo, Lincen Jiang, Kun Han, Guohua Huang, Jue Wang, Jianhua Lan, Delin Wang

    Published 2025-05-01
    “…Inter- and intraobserver correlation analysis, t-test, Spearman correlation analysis, and the least absolute shrinkage and selection operator (LASSO) algorithm with a five-fold cross-validation were applied for feature selection. …”
    Get full text
    Article
  5. 285

    Identification of novel metabolism-related biomarkers of Kawasaki disease by integrating single-cell RNA sequencing analysis and machine learning algorithms by Chenhui Feng, Zhimiao Wei, Xiaohui Li, Xiaohui Li

    Published 2025-04-01
    “…We analyzed the cellular heterogeneity of BAM and FAM at the single-cell level using R packages. Through differential expressed genes (DEG) analysis, high-dimensional Weighted Correlation Network Analysis (hdWGCNA) and machine learning algorithms, we identified signature genes associated with both BAM and FAM. …”
    Get full text
    Article
  6. 286

    Study on privacy preserving encrypted traffic detection by Xinyu ZHANG, Bingsheng ZHANG, Quanrun MENG, Kui REN

    Published 2021-08-01
    “…Existing encrypted traffic detection technologies lack privacy protection for data and models, which will violate the privacy preserving regulations and increase the security risk of privacy leakage.A privacy-preserving encrypted traffic detection system was proposed.It promoted the privacy of the encrypted traffic detection model by combining the gradient boosting decision tree (GBDT) algorithm with differential privacy.The privacy-protected encrypted traffic detection system was designed and implemented.The performance and the efficiency of proposed system using the CICIDS2017 dataset were evaluated, which contained the malicious traffic of the DDoS attack and the port scan.The results show that when the privacy budget value is set to 1, the system accuracy rates are 91.7% and 92.4% respectively.The training and the prediction of our model is efficient.The training time of proposed model is 5.16 s and 5.59 s, that is only 2-3 times of GBDT algorithm.The prediction time is close to the GBDT algorithm.…”
    Get full text
    Article
  7. 287
  8. 288

    A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms by Yangbo Chen, Wei Ou, Mengxue Pang, Jianqiang Ma, Qiuling Yue, Wenbao Han

    Published 2025-04-01
    “…The proposed system employs a layered data structure for warehouse receipts and uses differentiated encryption strategies. These features enable flexible data sharing while ensuring the protection of sensitive information. …”
    Get full text
    Article
  9. 289

    Integration of ground-based and remote sensing data with deep learning algorithms for mapping habitats in Natura 2000 protected oak forests by Lucia Čahojová, Ivan Jarolímek, Barbora Klímová, Michal Kollár, Michaela Michalková, Karol Mikula, Aneta A. Ožvat, Denisa Slabejová, Mária Šibíková

    Published 2025-03-01
    “…A dataset was selected for the training of a deep learning algorithm called the Natural Numerical Network on the basis of the analysis results. …”
    Get full text
    Article
  10. 290

    An energy-based numerical continuation approach for quasi-static mechanical manipulation by Lin Yang, Huu-Thiet Nguyen, Chen Lv, Domenico Campolo, Franco Cardin

    Published 2025-01-01
    “…The proposed framework is evaluated with an inverted pendulum task, where the explored branch of the manifold demonstrates effectiveness.…”
    Get full text
    Article
  11. 291

    SAHAANN: A NOVEL EVOLUTIONARY ARTIFICIAL NEURAL NETWORK FOR IMPROVED FINANCIAL TIME SERIES FORECASTING by Abdul Khadeer, Vanaparthi Kiranmai, B. Suvarnamukhi, Ayaz Mohiuddin, Balika Mahesh, P M Suresh, J Arthy, Sasikumar A N, Sudersan Behera, Mohd Ayaz Uddin

    Published 2025-03-01
    “…We were able to see how the results of training the ANN model with different metaheuristics, such as the genetic algorithm (GA), particle swarm optimization (PSO), differential evolution (DE), fireworks algorithm (FWA), and chemical reaction optimization (CRO). …”
    Get full text
    Article
  12. 292
  13. 293

    Peculiarities of dynamic evaluation of globular formation outlines of the lungs with multislice computed tomography by Vladimir G. Kolmogorov, Ivan V. Molodkin, Vladimir K. Konovalov, Alexander M. Shayduk, Sergey A. Ostanin, Sergey L. Leonov, Olga V. Borisenko, Mikhail A. Fedoseyev, Julia S. Modakalova

    Published 2017-07-01
    “…At CT gauge body phantoms test facilities are widely used for evaluating the performance of scanners that allow the evaluation of scanner characteristics : noise, contrast sensitivity, positioning accuracy, stiffness of the radiation beam, the layer thickness, spatial resolution, etc.Aim. …”
    Get full text
    Article
  14. 294
  15. 295

    Early arteriovenous malformation mimicking pediatric capillary malformation: diagnostic value of infrared thermography by Hao Gu, Xiaojie Yue, Xiong Zhao, Qiang Shu

    Published 2025-06-01
    “…Integrating IRT into initial diagnostic algorithms may enhance the accuracy of differential diagnosis for vascular malformations, particularly early-stage AVMs.…”
    Get full text
    Article
  16. 296
  17. 297

    Research progress on shale gas productivity evaluation: concepts, methods and future directions by ZHU Suyang, PENG Zhen, DI Yunting, PENG Xiaolong, LIU Dongchen, GUAN Wenjie

    Published 2025-06-01
    “…Early and late production stages exhibit distinct controlling factors, leading to differentiated perspectives across the various evaluation methods. …”
    Get full text
    Article
  18. 298

    Treatment of the Cirrhotic Patients Considering Portal Hypertension Severity Degree and Comorbid Syntropic Extrahepatic Lesions, their Complications: Modified Algorithm, its Effect... by Ferko M.

    Published 2016-12-01
    “…Treatment of the patients with liver cirrhosis according to the modified by us algorithm is effective for the results of evaluation of physical parameters and quality of life. …”
    Get full text
    Article
  19. 299

    Optimizing LoRaWAN Gateway Placement in Urban Environments: A Hybrid PSO-DE Algorithm Validated via HTZ Simulations by Kanar Alaa Al-Sammak, Sama Hussein Al-Gburi, Ion Marghescu, Ana-Maria Claudia Drăgulinescu, Cristina Marghescu, Alexandru Martian, Nayef A. M. Alduais, Nawar Alaa Hussein Al-Sammak

    Published 2025-06-01
    “…This study investigates how to optimize the placement of LoRaWAN gateways by using a combination of Particle Swarm Optimization (PSO) and Differential Evolution (DE). The approach is validated through simulations driven by HTZ to evaluate network performance in urban settings. …”
    Get full text
    Article
  20. 300