Showing 421 - 440 results of 657 for search 'adaptive different (evolution OR evaluation) algorithm', query time: 0.17s Refine Results
  1. 421

    Enhancing MANET Security Through Federated Learning and Multiobjective Optimization: A Trust-Aware Routing Framework by Saad M. Hassan, Mohd Murtadha Mohamad, Farkhana Binti Muchtar, Firoz Bin Yusuf Patel Dawoodi

    Published 2024-01-01
    “…We evaluate this framework against existing protocols across various scenarios, including different network densities, mobility patterns, and malicious node percentages. …”
    Get full text
    Article
  2. 422

    Cross-Cultural Sense-Making of Global Health Crises: A Text Mining Study of Public Opinions on Social Media Related to the COVID-19 Pandemic in Developed and Developing Economies by Adham Kahlawi, Firas Masri, Wasim Ahmed, Josep Vidal-Alaball

    Published 2025-01-01
    “…ResultsThe analysis revealed significant regional and temporal differences in collective sense-making during the pandemic. …”
    Get full text
    Article
  3. 423

    Developing an efficient explainable artificial intelligence approach for accurate reverse osmosis desalination plant performance prediction: application of SHAP analysis by Meysam Alizamir, Mo Wang, Rana Muhammad Adnan Ikram, Sungwon Kim, Kaywan Othman Ahmed, Salim Heddam

    Published 2024-12-01
    “…In this study, the predictive accuracy of six different machine learning models, including Natural Gradient-based Boosting (NGBoost), Adaptive Boosting (AdaBoost), Categorical Boosting (CatBoost), Support vector regression (SVR), Gaussian Process Regression (GPR), and Extremely Randomized Tree (ERT) was evaluated for modelling the parameter of permeate flow as a key element in system efficiency, energy consumption, and water quality using six various input combinations of feed water salt concentration, condenser inlet temperature, feed flow rate, and evaporator inlet temperature. …”
    Get full text
    Article
  4. 424

    Rapid Lactic Acid Content Detection in Secondary Fermentation of Maize Silage Using Colorimetric Sensor Array Combined with Hyperspectral Imaging by Xiaoyu Xue, Haiqing Tian, Kai Zhao, Yang Yu, Ziqing Xiao, Chunxiang Zhuo, Jianying Sun

    Published 2024-09-01
    “…To minimize model redundancy, three algorithms, such as competitive adaptive reweighted sampling (CARS), were used to extract the characteristic wavelengths of the three dyes, and the combination of the characteristic wavelengths obtained by each algorithm was used as an input variable to build an analytical model for quantitative prediction of the lactic acid content by support vector regression (SVR). …”
    Get full text
    Article
  5. 425

    Synchronous Acquisition and Processing of Electro- and Phono-Cardiogram Signals for Accurate Systolic Times’ Measurement in Heart Disease Diagnosis and Monitoring by Roberto De Fazio, Ilaria Cascella, Şule Esma Yalçınkaya, Massimo De Vittorio, Luigi Patrono, Ramiro Velazquez, Paolo Visconti

    Published 2025-07-01
    “…Both the ECG electrodes and the microphone were positioned on the chest to ensure the spatial alignment of the signals. An adaptive segmentation algorithm was developed to segment PCG and ECG signals based on their morphological and temporal features. …”
    Get full text
    Article
  6. 426

    TLINet: A defects detection method for insulators of overhead transmission lines using partially transformer block. by Xun Li, Yuzhen Zhao, Yang Zhao, Zhun Guo, Yongming Zhang, Xiangke Jiao, Baoxi Yuan

    Published 2025-01-01
    “…Additionally, to verify the robustness of the proposed algorithm, TLINet is evaluated on the VOC07 + 12 dataset. …”
    Get full text
    Article
  7. 427

    A Privacy-Preserving Polymorphic Heterogeneous Security Architecture for Cloud–Edge Collaboration Industrial Control Systems by Yukun Niu, Xiaopeng Han, Chuan He, Yunfan Wang, Zhigang Cao, Ding Zhou

    Published 2025-07-01
    “…The architecture introduces three key innovations: (1) a hybrid event–time triggered scheduling algorithm with credibility assessment and heterogeneity metrics to mitigate common-mode escape scenarios, (2) an adaptive privacy budget allocation mechanism that balances privacy protection effectiveness with system availability based on attack activity levels, and (3) a unified framework that organically integrates privacy-preserving arbitration with heterogeneous redundancy management. …”
    Get full text
    Article
  8. 428

    Performances improvement of Shunt active power filter With voltage sensor failure by Aziz Boukadoum, Abla Bouguerne, Tahar Bahi

    Published 2023-06-01
    “…The effectiveness of this filter essentially lies in its control and command strategy to better respond to production and distribution constraints. It automatically adapts to the evolution of disturbances introduced by non-linear loads connected to the electrical network and their response is instantaneous. …”
    Get full text
    Article
  9. 429

    Optimal Dual Control Strategy for Multi-Interconnected Microgrids Under Unintentional Islanding and Fault Scenarios by H. K. Shaker, Ines Mahmoud, Magdi A. Mosa, K. M. Abdel-Latif, A. A. Ali, H. E. Keshta

    Published 2025-01-01
    “…To address this issue, this paper proposes a self-tuning PI (ST-PI) controller, which is a nonlinear adaptive controller that can adapt to different operating points to regulate the system voltage and frequency. …”
    Get full text
    Article
  10. 430

    Temporal Denoising of Infrared Images via Total Variation and Low-Rank Bidirectional Twisted Tensor Decomposition by Zhihao Liu, Weiqi Jin, Li Li

    Published 2025-04-01
    “…Compared to some of the latest algorithms, bt-LPTVTD demonstrates improvements across all evaluation metrics. …”
    Get full text
    Article
  11. 431

    Analysis of Deep Learning Techniques for Vehicle Detection and Reidentification Using Data from Multiple Drones and Public Datasets by FELIPE P.A. EUPHRÁSIO, RAFAEL M. DE ANDRADE, ELCIO H. SHIGUEMORI, LIANGRID L. SILVA, MOISÉS JOSÉ S. FREITAS, NATHAN AUGUSTO Z. XAVIER, ARGEMIRO S.S. SOBRINHO

    Published 2025-03-01
    “…YOLOv4 was selected for detection, while the DeepSORT algorithm was chosen for tracking. The proposed solution considers the generalization capabilities of these techniques with varied images from different drones in different positions. …”
    Get full text
    Article
  12. 432

    The contribution of cause-effect link to representing the core of scientific paper-The role of Semantic Link Network. by Mengyun Cao, Xiaoping Sun, Hai Zhuge

    Published 2018-01-01
    “…The Semantic Link Network is a general semantic model for modeling the structure and the evolution of complex systems. Various semantic links play different roles in rendering the semantics of complex system. …”
    Get full text
    Article
  13. 433

    Enhancing Weather Target Detection with Non-Uniform Pulse Repetition Time (NPRT) Waveforms by Luyao Sun, Tao Wang

    Published 2024-11-01
    “…Techniques such as multiple-pulse repetition frequency, staggered pulse repetition time (PRT), and pulse phase coding are commonly used to mitigate this issue. The current study evaluates the adaptability/capability of a specific type of low-capture signal called the non-uniform PRT (NPRT) through analyzing the weather target characteristics of typical velocity distributions. …”
    Get full text
    Article
  14. 434

    HTML5-based graphic image processing and collaborative drawing technology by Yinghua Liang

    Published 2024-12-01
    “…The simulation analysis is carried out on MATLAB, and different image compression algorithms are used for comparison. …”
    Get full text
    Article
  15. 435

    2CA-R<sup>2</sup>: A Hybrid MAC Protocol for Machine-Type Communications by Sergio Javier-Alvarez, Pablo Hernandez-Duran, Miguel Lopez-Guerrero, Luis Orozco-Barbosa

    Published 2025-05-01
    “…What distinguishes this proposal is that the contention stage is controlled by a conflict–resolution algorithm known as Adaptive-2C. The protocol was evaluated using a model based on a Markov chain and computer simulations. …”
    Get full text
    Article
  16. 436

    Optimal design of a hybrid system composed of coagulation process and multi-stage filtration unit for on-site treatment of greywater in rural area by Zahra Akbari, Fereshteh Nourmohammadi Dehbalaei, Zahra Mohammad Hosseini, Seyed Taghi Omid Naeeni

    Published 2025-05-01
    “…Multilayer nonlinear machine learning model was utilized to evaluate the performance of this hybrid system and adaptive heuristic search algorithm was used to achieve the optimal configuration of multilayer sand filter using optimization technique. …”
    Get full text
    Article
  17. 437

    Artificial intelligence in educational technology and transformative approaches to English language using fuzzy framework with CRITIC-TOPSIS method by Jingdan Liu, Xujie Bao, Liji Chen

    Published 2025-07-01
    “…Abstract Artificial intelligence (AI) is transforming educational technology by enabling personalized, adaptive, and data-driven learning experiences. Machine learning algorithms analyze student performance to tailor content delivery, while natural language processing facilitates interactive learning through voice assistants and essay evaluation. …”
    Get full text
    Article
  18. 438

    Combination treatment optimization using a pan-cancer pathway model. by Robin Schmucker, Gabriele Farina, James Faeder, Fabian Fröhlich, Ali Sinan Saglam, Tuomas Sandholm

    Published 2021-12-01
    “…In order to solve the treatment optimization problems, we combine the Covariance Matrix Adaptation Evolution Strategy (CMA-ES) algorithm with a significantly more scalable sampling scheme for truncated Gaussian distributions, based on a Hamiltonian Monte-Carlo method. …”
    Get full text
    Article
  19. 439

    Deepmol: an automated machine and deep learning framework for computational chemistry by João Correia, João Capela, Miguel Rocha

    Published 2024-12-01
    “…Despite its potential to revolutionize the field, researchers are often encumbered by obstacles, such as the complexity of selecting optimal algorithms, the automation of data pre-processing steps, the necessity for adaptive feature engineering, and the assurance of model performance consistency across different datasets. …”
    Get full text
    Article
  20. 440

    Detection and Analysis of Malicious Software Using Machine Learning Models by Selman Hızal, Ahmet Öztürk

    Published 2024-08-01
    “…The continuous evolution of malware poses a significant challenge in cybersecurity, adapting to technological advancements despite implemented security measures. …”
    Get full text
    Article