Search alternatives:
differential » different (Expand Search)
Showing 401 - 420 results of 972 for search 'Differential evaluation algorithm', query time: 0.16s Refine Results
  1. 401

    DMCM: Dwo-branch multilevel feature fusion with cross-attention mechanism for infrared and visible image fusion. by Xicheng Sun, Fu Lv, Yongan Feng, Xu Zhang

    Published 2025-01-01
    “…The experimental results demonstrate that the proposed method outperforms other algorithms in both subjective and objective evaluation results. …”
    Get full text
    Article
  2. 402

    A New Method Calculating Stresses and Displacements in Elastic Bars by Z. Górecki, J. Rybicki

    Published 1987-12-01
    “…The algorithm is based on Vlasov's shell theory. The differential equations derived are solved numerically by means of the method of splines. …”
    Get full text
    Article
  3. 403

    Prediction Model for Compaction Quality of Earth-Rock Dams Based on IFA-RF Model by Weiwei Lin, Yuling Yan, Pu Xu, Xiao Zhang, Yichuan Zhong

    Published 2025-04-01
    “…The method utilizes a dynamic inertia weight, an adaptive factor, and a differential evolution strategy to enhance the search capability of the firefly algorithm. …”
    Get full text
    Article
  4. 404

    Kinematic Performance Analysis and Dimensional Optimization for 2PUS-PU Parallel Mechanism by Linxian Che, Jian Yi, Bing He, Xuedong Lin

    Published 2020-12-01
    “…A constrained optimization model is constructed to formulate the design problem of dimensional parameters on the maximizing radius of RTOW,and particle swarm optimization and differential evolution algorithm are adopted to solve this problem. …”
    Get full text
    Article
  5. 405

    METAHEURISTIC OPTIMIZATION METHODS FOR PARAMETERS ESTIMATION OF DYNAMIC SYSTEMS by A. V. Panteleev, A. U. Kryuchkov

    Published 2017-05-01
    “…The article considers the usage of metaheuristic methods of constrained global optimization: “Big Bang - Big Crunch”, “Fireworks Algorithm”, “Grenade Explosion Method” in parameters of dynamic systems estimation, described with algebraic-differential equations. …”
    Get full text
    Article
  6. 406

    KFCM-PSOTD : An Imputation Technique for Missing Values in Incomplete Data Classification by Muhaimin Ilyas, Syaiful Anam, Trisilowati Trisilowati

    Published 2024-05-01
    “…The outcomes demonstrate that the KFCM-PSOTD algorithm has a better performance; even the difference in evaluation scores obtained reaches 10% better than other imputation techniques.…”
    Get full text
    Article
  7. 407

    Adaptive dynamic programming-based multi-fault tolerant control of reconfigurable manipulator with input constraint by Zhenguo Zhang, Tianhao Ma, Yadan Zhao, Shuai Yu, Fan Zhou

    Published 2024-08-01
    “…Then, an evaluation neural network (NN) is established and the Hamilton–Jacobi–Bellman (HJB) equation is solved by online strategy iterative algorithm. …”
    Get full text
    Article
  8. 408

    Fractional-Order Adaptive P-Laplace Equation-Based Art Image Edge Detection by Ming Chen

    Published 2021-01-01
    “…By comparing with other algorithms, the image edge detection effect is measured with the help of evaluation metrics such as peak signal-to-noise ratio and structural similarity, and the optimal value is selected iteratively so that the image with the best edge detection result is retained. …”
    Get full text
    Article
  9. 409

    Calibration and surrogate model-based sensitivity analysis of crystal plasticity finite element models by Hugh Dorward, David M. Knowles, Eralp Demir, Mahmoud Mostafavi, Matthew J. Peel

    Published 2024-11-01
    “…Comparison of the Nelder-Mead and differential evolution algorithms demonstrated that only the differential evolution algorithm was able to reliably find the global optimum due to the presence of local minima in the calibration objective function. …”
    Get full text
    Article
  10. 410

    Prediction of Drifter Trajectory Using Evolutionary Computation by Yong-Wook Nam, Yong-Hyuk Kim

    Published 2018-01-01
    “…In contrast to existing numerical models that use the Lagrangian method, we used an optimization algorithm to predict the trajectory. As the evaluation measure, a method that gives a better score as the Mean Absolute Error (MAE) when the difference between the predicted position in time and the actual position is lower and the Normalized Cumulative Lagrangian Separation (NCLS), which is widely used as a trajectory evaluation method of drifters, were used. …”
    Get full text
    Article
  11. 411

    Automated Detection of Central Retinal Artery Occlusion Using OCT Imaging via Explainable Deep Learning by Ansgar Beuse, Daniel Alexander Wenzel, MD, Martin Stephan Spitzer, MD, Karl Ulrich Bartz-Schmidt, MD, Maximilian Schultheiss, MD, Sven Poli, MD, Carsten Grohmann, PhD, MD

    Published 2025-03-01
    “…Conclusions: Our machine learning algorithm (MLA) exhibited a high AUC, as well as sensitivity and specificity in detecting CRAO and the differential classes, respectively. …”
    Get full text
    Article
  12. 412

    QuantumGS-Box—A Key-Dependent GA and QRNG-Based S-Box for High-Speed Cloud-Based Storage Encryption by Anish Saini, Athanasios Tsokanos, Raimund Kirner

    Published 2024-12-01
    “…The proposed work generates the S-box optimized values in a dynamic way, and an experimental evaluation of the proposed S-box method has been conducted using several cryptographic criteria, including bit independence criteria, speed, non-linearity, differential and linear approximation probabilities, strict avalanche criteria and balanced output. …”
    Get full text
    Article
  13. 413

    An Effective ABC-SVM Approach for Surface Roughness Prediction in Manufacturing Processes by Juan Lu, Xiaoping Liao, Steven Li, Haibin Ouyang, Kai Chen, Bing Huang

    Published 2019-01-01
    “…Further, to evaluate the optimization performance of ABC in parameters determination of SVM, this study compares the prediction performance of SVM models optimized by well-known evolutionary and swarm-based algorithms (differential evolution (DE), genetic algorithm (GA), particle swarm optimization (PSO), and ABC) and analyzes ability of these optimization algorithms from their optimization mechanism and convergence speed based on experimental datasets of turning and milling. …”
    Get full text
    Article
  14. 414

    An Electrochemical/Thermodynamic Analytical Model for Hard‐Pack Lithium‐Ion Batteries in Engineering Education by Ligang Wang, Hangyang Li, Zhiliang Huang, Peng Wu, Jiayuan Huangfu

    Published 2025-02-01
    “…The paper elucidates the mechanisms of electrochemical/thermodynamic behavior evolution in lithium‐ion batteries under thermal abuse and develops a state evaluation model based on ordinary differential equations. …”
    Get full text
    Article
  15. 415

    ENCRYPTION OF IMAGES ON THE BASIS OF CHAOTIC MAPPING AND PARALLEL COMPUTING by A. V. Sidorenko, M. S. Shishko

    Published 2017-12-01
    “…Resistance of this algorithm to statistical and differential cryptanalysis was evaluated. …”
    Get full text
    Article
  16. 416

    Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps by Majid Khan, Noor Munir

    Published 2025-07-01
    “…In our study, we provide a systematic CPA of the elementary algorithm, confirmed using experimental evaluation. …”
    Get full text
    Article
  17. 417

    Postoperative outcome analysis of chronic rhinosinusitis using transfer learning with pre-trained foundation models based on endoscopic images: a multicenter, observational study by Wentao Gong, Keguang Chen, Xiao Chen, Xueli Liu, Zhen Li, Li Wang, Yuxuan Shi, Quan Liu, Xicai Sun, Xinsheng Huang, Xu Luo, Hongmeng Yu

    Published 2025-07-01
    “…Conclusion The transfer learning algorithm model based on pre-trained foundation models can provide accurate and reproducible analysis of postoperative outcomes in CRS, effectively addressing the issue of high subjectivity in postoperative evaluation. …”
    Get full text
    Article
  18. 418

    Service Composition and Optimal Selection for Industrial Software Integration with QoS and Availability by Yangzhen Cao, Shanhui Liu, Chaoyang Li, Hongen Yang, Yuanyang Wang

    Published 2025-07-01
    “…To efficiently solve the proposed model, a hybrid enhanced multi-objective Gray Wolf Optimizer (HEMOGWO) was developed. This algorithm integrated Tent chaotic mapping and a Levy flight-enhanced differential evolution (DE) strategy. …”
    Get full text
    Article
  19. 419

    Primitive-Level vs. Implementation-Level DPA Security: a Certified Case Study by Charles Momin, François-Xavier Standaert, Corentin Verhamme

    Published 2025-06-01
    “… Implementation-level countermeasures like masking can be applied to any cryptographic algorithm in order to mitigate Differential Power Analysis (DPA). …”
    Get full text
    Article
  20. 420

    Implementation of MS Circle Map in Digital Image Encryption by Ichsani Mursidah, Suryadi MT, Sarifuddin Madenda, Suryadi Harmanto

    Published 2025-06-01
    “…The proposed method features a large key space, high key sensitivity, and strong resistance to brute force, statistical, and differential attacks. Performance evaluation through key space analysis, initial value sensitivity, entropy, correlation coefficient, NPCR, and UACI shows that the encrypted image using MS Circle Map has strong security properties. …”
    Get full text
    Article