Search alternatives:
evaluating » evaluation (Expand Search)
applications » application (Expand Search)
evaluating » evaluation (Expand Search)
applications » application (Expand Search)
-
781
Research on Ship Heave Motion Compensation Control Under Complex Sea State Environment Based on Improved Reinforcement Learning
Published 2025-07-01“…This composite reward function not only reflects the quality of current state‒action pairs but also incorporates predictions and evaluations of future states. …”
Get full text
Article -
782
Advanced Text Summarization Model Incorporating NLP Techniques and Feature-Based Scoring
Published 2025-01-01“…For example, various textual features such as Named Entity Counts, Noun Counts, and Sentence Position contribute to the summarization quality appropriately. This study’s summarization algorithm was tested using the CNN, XSum and BBC Summarization datasets, which aggregate documents from different areas. …”
Get full text
Article -
783
-
784
Recommending Tolerance Value for SpO2 Devices with Linear Regression Based on Measuring Tape
Published 2025-02-01“…Using a linear regression algorithm, SpO2 values from different bands were classified for quality. …”
Get full text
Article -
785
A 3D reconstruction platform for complex plants using OB-NeRF
Published 2025-03-01“…Finally, Object-Based NeRF we proposed is utilized for the fine-scale reconstruction of plants. The OB-NeRF algorithm introduced a new ray sampling strategy that improved the efficiency and quality of target plant reconstruction without segmenting the background of images. …”
Get full text
Article -
786
Permission clustering-based attribute value optimization
Published 2021-08-01“…In new large-scale computing environment, the attributes of entities were massive and they had complex sources and uneven quality, which were great obstacles to the application of ABAC (attribute-based access control).The attributes were also hard to be corrected manually, making it difficult to be applied in access control system straightly.To solve the optimization problem of nominal attributes, a novel algorithm of attribute value optimization based on permission clustering was designed, in which entities were presented by the privilege set related to them.So that the entities were tagged by density-based clustering method with distances of their privilege set presentations.Then the attribute values were reduced and corrected based on rough set theory.Finally, the algorithm was verified on UCI data sets, which proved that after applying it, ABAC policy mining was improved in the evaluation criteria, such as the true positive rate and F1-score.…”
Get full text
Article -
787
A Low-Cost Antipodal Vivaldi Antenna-Based Peanut Defect Rate Detection System
Published 2025-03-01“…As a result, it offers an affordable and practical solution for quality control in peanut production, showing great potential for wide application in the peanut industry.…”
Get full text
Article -
788
A New Gradient Based Surface Defect Detection Method for the Ceramic Tile
Published 2022-12-01“…Performance of the proposed method was evaluated with quality metric and subjective evaluation. …”
Get full text
Article -
789
ICA-based Single Channel Audio Separation: New Bases and Measures of Distance
Published 2013-10-01“…It was tested on mixes of two and three sounds. The perceptual quality of separation obtained with the measures of distance proposed was evaluated by listening tests, indicating “beta” and “correlation” measures as the most appropriate. …”
Get full text
Article -
790
Principal component analysis of time delay in large IP network
Published 2021-04-01“…Network time delay is one of the key indexes to evaluate network performance.Principal component analysis (PCA) is a kind of multivariable analysis and declination algorithm commonly used in the field of data mining.Based on PCA analysis of time delay in large IP networks, aiming to find out the deep reason of time delay and the interdependencies among nodes of the network, a scientific and reasonable network time delay evaluation system was built, and effective suggestions for IP network construction and optimization were finally got.The off-line analysis of the historical network delay is only a preliminary application of the PCA.In the future, PCA can be applied to the real-time on-line monitoring and analysis of the network performance, such as network traffic, network delay, network packet loss, etc., in combination with the network topology, current network traffic direction, routing, distance and other related factors, thus the efficiency and quality of network operations can be further improved.…”
Get full text
Article -
791
ON ESTIMATED ACCURACY OF PART CUTTING UNDER MACHINE INTELLIGENT CONTROL
Published 2014-09-01“…The novelty of the approach is in analyzing the effect of the combined characteristics that is more informative versus the effect estimate of each of them. An algorithm for the function calculation program of distributing the cutterpath coordinates used to evaluate entering the acceptable range is presented. …”
Get full text
Article -
792
A New Efficient Approach to Model Stiff Biogeochemical Reactive Transport Scenarios Across Groundwater Systems
Published 2024-10-01“…Overall, our approach offers a robust and efficient solution for modeling stiff biogeochemical processes in groundwater systems. Its successful application to diverse reaction networks highlights its potential for broad implementation in environmental and engineering contexts, paving the way for accurate and computationally feasible groundwater quality assessments.…”
Get full text
Article -
793
Mapping the Research Landscape of Agricultural Sciences
Published 2018-03-01“… A research landscape is a high-level description of the current state of a certain scientific field and its dynamics. High-quality research landscapes are important tools that allow for more effective research management. …”
Get full text
Article -
794
Computational approaches for structural analysis of wood specimens
Published 2024-12-01“…Usually, its purpose is to evaluate orientation and to conduct local structural analysis. …”
Get full text
Article -
795
Building Consumption Data Systems Driven by AI Plus Expert for Scientific and Technical Literature Information Resources
Published 2024-09-01“…Furthermore, the paper deconstructs and analyzes the risks associated with the involvement of AI in the construction of consumer-end data systems, including four types of risks: machine algorithm risks, annotation content risks, annotation data risks and application risks. …”
Get full text
Article -
796
A metaheuristic to support the distribution of COVID-19 vaccines
Published 2021-10-01“…Effective analysis was obtained in the evaluation of the proposed algorithm, both in terms of computational effort and the quality of the final solution. …”
Get full text
Article -
797
Precise Foot Feature Point Localization and Automatic Parameters Measurement
Published 2025-05-01Get full text
Article -
798
Persistent Homology Combined with Machine Learning for Social Network Activity Analysis
Published 2024-12-01“…Numerical experiments are conducted to evaluate the performance of clustering quality metrics such as profile coefficients. …”
Get full text
Article -
799
Classroom Expression Recognition Based on Deep Learning
Published 2024-12-01“…In the field of education, classroom expression recognition technology has important application value. It can help teachers understand students’ emotions and learning attitudes and adjust teaching strategies in time to improve learning outcomes. …”
Get full text
Article -
800
Quadratic interpolation optimization-based 2DoF-PID controller design for highly nonlinear continuous stirred-tank heater process
Published 2025-05-01“…This work introduces a pioneering application of the QIO algorithm in industrial temperature control, offering a scalable and cost-efficient solution for complex nonlinear systems.…”
Get full text
Article