Showing 7,221 - 7,240 results of 7,873 for search 'comparative research algorithm', query time: 0.15s Refine Results
  1. 7221

    Statistical Data-Generative Machine Learning-Based Credit Card Fraud Detection Systems by Xiaomei Feng, Song-Kyoo Kim

    Published 2025-07-01
    “…Hypothesis testing confirmed that the performance of the merged dataset was statistically significant compared to the original datasets. This study highlights the importance of robust data handling techniques in developing effective fraud detection systems, setting the stage for future research on combining different datasets and improving predictive accuracy in the financial sector.…”
    Get full text
    Article
  2. 7222

    Survey of node localization scheme in underwater wireless sensor network by YANG Qiuling, ZHU Rongxin, TANG Zhichao, LI Wenjie, HUANG Xiangdang

    Published 2025-01-01
    “…Representative methods were divided into three categories, namely traditional algorithms, deep learning models, and reinforcement learning strategies, and they were summarized and compared in terms of their fundamental principles, performance characteristics, and applicable scenarios. …”
    Get full text
    Article
  3. 7223

    Synergistic Integration of LQR Control and PSO Optimization for Advanced Active Suspension Systems Utilizing Electro-Hydraulic Actuators and Electro-Servo Valves by Trong Tu

    Published 2025-06-01
    “…This research remarks the fundamentals of the experimental validation and further refinement of these control algorithms to adapt to various driving conditions and vehicle models, ultimately aiming to transition these optimized controllers from theoretical frameworks to practical, real-world applications. …”
    Get full text
    Article
  4. 7224

    Design and Development of IoT-based Harvesting Robo-Vec by Sadiq Ur Rehman, Yasmin Abdul Wahab

    Published 2025-06-01
    “…Experimental results show that Harvesting Robo-Vec improves efficiency, reduces labor costs, and enhances productivity compared to manual methods. This study underscores the potential of IoT-based robots in agriculture, contributing to precision farming and autonomous robotics research. …”
    Get full text
    Article
  5. 7225

    ENHANCING STUDENTS’ LEARNING OUTCOMES IN CLASSICAL CRYPTOGRAPHY THROUGH INTERACTIVE 3D SIMULATIONS by Wenda Novayani, Iqbal Alhuda

    Published 2024-11-01
    “…Based on a questionnaire conducted among students of Politeknik Caltex Riau (PCR) who have studied classical cryptography, the Vigenere Cipher and Affine Cipher were found to be the most difficult algorithms to understand. This research aims to investigate the improvement in students' knowledge of classical cryptography through interactive 3D simulations. …”
    Get full text
    Article
  6. 7226

    Microwave Sensors and Their Applications in Permittivity Measurement by Changjun Liu, Chongwei Liao, Yujie Peng, Weixin Zhang, Bo Wu, Peixiang Yang

    Published 2024-12-01
    “…This review illustrates many new types of research in recent years. Firstly, the application background is briefly introduced, and several main measurement methods are presented. …”
    Get full text
    Article
  7. 7227

    ENHANCING PROSTHETIC FUNCTIONALITY: A NOVEL APPROACH WITH MYOELECTRIC BIONIC ARM DESIGN by Nivethitha B, Sriram V, Mukundha Krishnan B, Manimaran V

    Published 2025-06-01
    “…This research contributes to the advancement of intelligent, high-performance prosthetic devices, bridging the gap between biological and artificial limb function.…”
    Get full text
    Article
  8. 7228

    Design, Construction, and Evaluation of an Automatic Feeder Control System for Sugarcane Billet Planters by B. Abbasian, M. E. Khorasani Ferdavani, H. Zaki Dizaji

    Published 2024-12-01
    “…The load cell control method emerged as the most effective solution, successfully eliminating the need for operators while ensuring high standards of planting quality and efficiency. Additional research could explore advancements in sensor technology and control algorithms to further enhance the performance of automatic feeder control systems.AcknowledgmentThe authors would like to express their gratitude to the Managing Director of Farabi Agro-Industrial Company and its staff, as well as the technical staff of Poya Sazan Sabz Avane Company, who cooperated in the preparation and evaluation stages of the system. …”
    Get full text
    Article
  9. 7229

    A practical study of artificial intelligence-based real-time feedback in online physical education teaching by Jiewei Ma, Lianzhen Ma, Shilong Qi, Bo Zhang, Wenpian Ruan

    Published 2025-08-01
    “…While promising, the technology has limitations in accuracy and interactivity. Future research should focus on optimizing algorithms and integrating adaptive learning to create more effective OLPE strategies.…”
    Get full text
    Article
  10. 7230

    Moving Vehicles Detection and Tracking on Highways and Transportation System for Smart Cities by Manoj Kumar, Susmita Ray, Dileep Kumar Yadav

    Published 2022-03-01
    “…The literature also reveals for existing research for the machine learning and AI based methodologies to resolve more complex real-time problems. …”
    Get full text
    Article
  11. 7231
  12. 7232

    Development of a parametric production jacket pattern for an automated pattern-making system by Narae Kim, Jinhee Park

    Published 2025-07-01
    “…Furthermore, we believe that through subsequent studies and analyzing a broader range of garment types and sizes, the methodology of the parametric production pattern developed in this research will contribute to establishing foundational algorithms for automating the process of garment pattern generation.…”
    Get full text
    Article
  13. 7233

    Do Calibrated Recommendations Affect Explanations? A Study on Post-Hoc Adjustments by Paul Dany Flores Atauchi, André Levi Zanon, Leonardo Chaves Dutra da Rocha, Marcelo Garcia Manzato

    Published 2025-06-01
    “…Our study investigates two key research gaps: (1) the impact of graph embeddings in model-agnostic knowledge graph explanations, exploring their under-researched potential compared to syntactic approaches to produce meaningful explanations; and (2) the effect of calibration on recommendation explanations, assessing whether calibrated recommendation reordering influences the outcomes of explanation algorithms. …”
    Get full text
    Article
  14. 7234

    Privacy attack in federated learning is not easy: an experimental study by Hangyu Zhu, Liyuan Huang, Zhenping Xie

    Published 2025-07-01
    “…We analyze and discuss recent research papers on this topic and conduct experiments in a real FL environment to compare the performance of various attack methods. …”
    Get full text
    Article
  15. 7235

    University proceedings. Volga region. Technical sciences by E.A. Tchufistov, O.E. Tchufistov, M. Blagojević, M. Vasic

    Published 2024-12-01
    “…The purpose of the study is to use techniques, models and algorithms to establish the law of rotation of the driven element. …”
    Article
  16. 7236

    AN APPROACH TO CELL NUCLEI COUNTING IN HISTOLOGICAL IMAGE ANALYSIS by M. M. Lukashevich, V. V. Starovoitov

    Published 2016-07-01
    “…Critical parameters defined algorithms, configurable at each stage of image analysis. …”
    Get full text
    Article
  17. 7237

    Evaluating Deep Learning Networks Versus Hybrid Network for Smart Monitoring of Hydropower Plants by Fatemeh Hajimohammadali, Emanuele Crisostomi, Mauro Tucci, Nunzia Fontana

    Published 2024-11-01
    “…With modern hydropower plants equipped with sensors that capture extensive data, machine learning algorithms utilizing these data to detect and predict anomalies have gained research attention. …”
    Get full text
    Article
  18. 7238

    A trigonometric function-based big data model for network information security control mechanisms by Bohan Zhang, Ruoyu Tan

    Published 2025-07-01
    “…For instance, cryptography proposes the principle of confidentiality and uses key generation, plain text flow processes, and encryption algorithms to control the flow of ciphertext, all of which require extensive research on network system security. …”
    Get full text
    Article
  19. 7239
  20. 7240