Showing 1,301 - 1,320 results of 13,618 for search 'also algorithm', query time: 0.17s Refine Results
  1. 1301

    Auxiliary Particle Flow Track-Before-Detect Algorithm for Marine Neighboring Weak Targets by Fan Zhang, Chang Liu

    Published 2025-04-01
    “…Detection and tracking of marine weak targets can be effectively solved by track-before-detect (TBD) algorithms based on particle filtering. However, these algorithms are susceptible to influence from neighboring targets, leading to potential issues like misassociation and tracking failure. …”
    Get full text
    Article
  2. 1302

    A Branch-and-Price-and-Cut Algorithm for the Integrated Scheduling and Rostering Problem of Bus Drivers by Dung-Ying Lin, Chieh-Ju Juan, Ching-Chih Chang

    Published 2020-01-01
    “…The results show that the proposed BPC algorithm can solve problems with large real-world instances within a reasonable computational time. …”
    Get full text
    Article
  3. 1303
  4. 1304

    Self-Schedule and Self-Distributive MAC Scheduling Algorithms for Next-Generation Sensor Networks by Sheikh Tahir Bakhsh, Muhammad Aman Sheikh, Rayed AlGhamdi

    Published 2015-10-01
    “…Moreover, the proposed algorithms also guarantee conflict-free edge coloring because all the incident edges to a single node are assigned to colors in such a way that none of the edges should have the same color. …”
    Get full text
    Article
  5. 1305

    Enhanced Isolation Forest-Based Algorithm for Unsupervised Anomaly Detection in Lidar SLAM Localization by Guoqing Geng, Peining Wang, Liqin Sun, Han Wen

    Published 2025-04-01
    “…Using the mean, RMSE, and standard deviation as evaluation metrics, data comparisons confirmed the algorithm’s accuracy. Compared with several SOTA (state-of-the-art) algorithms and ablation studies, our algorithm also showed higher sensitivity.…”
    Get full text
    Article
  6. 1306

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm by Yurong LUO, Jin CAO, Hui LI, Xingwen ZHAO, Chao SHANG

    Published 2022-04-01
    “…In order to solve the current problems of electronic invoices, such as anti-counterfeiting, privacy leakage and low verification efficiency, an electronic invoice public verification architecture based on the national signature algorithm was proposed.Electronic invoice documents have complex data sources, sensitive user information on the ticket surface, frequent data flow and other characteristics as well as the demand for efficient public verification.Based on these motivations, the e-invoice generation and verification protocol was designed.Besides, a signature code generation scheme for invoice anti-counterfeiting was proposed based on certificate-free joint signature.Then multiple data verification and signatures of the invoicing party and the taxation authority can be realized.All kinds of invoice holders can not only verify the authenticity and data integrity of electronic invoices, but also publicly check the authenticity and data integrity of electronic invoices.The integration of data encryption algorithms protects user privacy data in electronic invoices, and at the same time can fulfill the requirements for authenticity or status verification under various invoice application scenarios.The checking party only needs to verify one signature to confirm the authenticity of the electronic invoice signed by both parties.Scyther security simulation tools were used to analyze the security of the proposed solution, which can verify the integrity and authenticity of the data source and check the confidentiality of the privacy data under various types of attacks.Compared with a typical overseas e-invoice checking scheme and a similar digital signature-based e-invoice checking scheme, the proposed scheme has obvious advantages in terms of checking efficiency and invoice file size.…”
    Get full text
    Article
  7. 1307

    EMPLOYING GENETIC ALGORITHM INSPIRED HYPERPARAMETER OPTIMIZATION IN MOBILE NET V2 ARCHITECTURE by Baljinder Kaur, Manik Rakhra, Nonita Sharma, Monika Mangla

    Published 2025-03-01
    “…This paper presents a novel approach for hyperparameter optimization for the MobileNetV2 architecture using a genetic algorithm. The proposed approach aims to automate the hyperparameter tuning leading to performance enhancement. …”
    Get full text
    Article
  8. 1308

    A Method to Reduce the Algorithm Complexity of the Single-Photodiode-per-Polarization Coherent Receiver by Keji Zhou, Sheng Cui, Yicong Tu, Deming Liu

    Published 2020-01-01
    “…Other than reducing the overall algorithm complexity, the new method also make the SCR more robust to laser frequency offset compared with the existing heterodyne detection based FRA. …”
    Get full text
    Article
  9. 1309

    Pasireotide-induced hyperglycemia in Cushing’s disease and Acromegaly: A clinical perspective and algorithms proposal by Przemysław Witek, Marek Bolanowski, Adam Krętowski, Aleksandra Głowińska

    Published 2024-12-01
    “…Pasireotide is an effective treatment for both Cushing’s disease (CD) and acromegaly due to its ability to suppress adrenocorticotropic hormone and growth hormone, and to normalize insulin-like growth factor-1 levels, resulting in tumor shrinkage. However, it may also cause hyperglycemia as a side effect in some patients. …”
    Get full text
    Article
  10. 1310

    Application of the Different Machine Learning Algorithms to Predict Dry Matter Intake in Feedlot Cattle by Hayati Köknaroğlu, Özgür Koşkan, Malik Ergin

    Published 2025-01-01
    “…It is recommended that the interpretation of model consistency should also consider MAE, MAPE, MSE, and RMSE values. In the current study, all machine learning algorithms yielded similar and lower performance metrics. …”
    Get full text
    Article
  11. 1311

    Privacy Risk Assessment of Medical Big Data Based on Information Entropy and FCM Algorithm by Xiaoliang Zhang, Tianwei Guo

    Published 2024-01-01
    “…However, the high sensitivity and privacy of medical data also bring serious security challenges. A privacy risk assessment model combining information entropy and fuzzy C-means clustering algorithm is proposed to address this issue. …”
    Get full text
    Article
  12. 1312

    Evaluation of genetic algorithm alternatives for wind speed modeling using grey relational analysis by Hilmi Işık, Muhammet Burak Kılıç

    Published 2025-04-01
    “…Therefore, this paper focuses on parameter estimates of the Weibull distribution using genetic algorithm (GA) optimization based on the maximum likelihood (ML) method. …”
    Get full text
    Article
  13. 1313

    Parameter Prediction for Metaheuristic Algorithms Solving Routing Problem Instances Using Machine Learning by Tomás Barros-Everett, Elizabeth Montero, Nicolás Rojas-Morales

    Published 2025-03-01
    “…In this work, we explore the application of machine learning algorithms to suggest suitable parameter values. We propose a methodology to use k-nearest neighbours and artificial neural network algorithms to predict suitable parameter values based on instance features. …”
    Get full text
    Article
  14. 1314

    Hybrid Approach for Protein Secondary Structure Prediction with KNN, SVM, and Neural Network Algorithms by Benjamin Mukanya Ntumba, Jean Paul Ngbolua Koto-Te-Nyiwa, Blaise Bikandu Kapesa, Nathanael Kasoro Mulenda

    Published 2025-06-01
    “…In this study, we propose a hybrid approach integrating K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Neural Network (NN) algorithms. We perform an in-depth analysis using various metrics, including accuracy, Q3 score, ROC, and precision-recall curves. …”
    Get full text
    Article
  15. 1315

    YOLO-Wheat: A More Accurate Real-Time Detection Algorithm for Wheat Pests by Yongkang Liu, Qinghao Wang, Qi Zheng, Yong Liu

    Published 2024-12-01
    “…Additionally, mAP@0.5:0.95 reached 46.5%, marking a 1.7% improvement. YOLO-Wheat also performs better than other popular object detection algorithms (YOLOv5, YOLOv10, RT-DETR), and the model is successfully deployed for simple real-time detection. …”
    Get full text
    Article
  16. 1316

    Coupling of green building construction based on particle Swarm optimizing neural network algorithm by Wang Leigang, Li Shaohua, Wang Liang, Zhang Zheng, Zhou Yuchen, Chang Long

    Published 2025-01-01
    “…The purpose is to strengthen safety risk management in green building construction by combining particle swarm optimisation with neural network algorithms. A risk coupling performance comparison was conducted between traditional and research algorithms. …”
    Get full text
    Article
  17. 1317

    COVID-19 World Vaccine Adverse Reactions Based on Machine Learning Clustering Algorithm by Lozan M. Abdulrahman, Adnan Mohsin Abdulazeez, Dathar A. Hasan

    Published 2021-05-01
    “…This study compared four clustering algorithms using the WEKA tool. Furthermore, it details the datasets in terms of different variables of precision, cluster case, number of iterations, time, and present the findings of these papers, and which clustering algorithms used and the accuracy of these algorithms. …”
    Get full text
    Article
  18. 1318

    A Novel Method for News Recommendation on Websites Using the Clustered-Vectors Optimization Algorithm by Piyanuch Chaipornkaew, Thepparit Banditwattanawong

    Published 2025-01-01
    “…Similarly, the English language dataset, such as Indian news, also demonstrated high performance, with the CVO algorithm achieving an accuracy of 99.90%, a precision of 99.41%, a recall of 99.62%, and an F1-score of 99.53%.…”
    Get full text
    Article
  19. 1319

    Comparative Review of Multi-Objective Optimization Algorithms for Design and Safety Optimization in Electric Vehicles by I Gede S. S. Dharma, Rachman Setiawan

    Published 2024-01-01
    “…The comparative results, based on four performance indicators&#x2014;hypervolume (HV), inverted generational distance (IGD), averaged Hausdorff distance <inline-formula> <tex-math notation="LaTeX">$\left ({{ \Delta _{p} }}\right)$ </tex-math></inline-formula>, and spread&#x2014;reveal that SLMEA emerged as the best algorithm, not only for RWMOP-BEV but also across other benchmark sets, including DTLZ problems and other real-world multi-objective optimization problems.…”
    Get full text
    Article
  20. 1320