Showing 1,121 - 1,140 results of 7,873 for search 'comparative research algorithm', query time: 0.15s Refine Results
  1. 1121
  2. 1122

    Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment by Faten Khalid Karim, José Varela-Aldás, Mohamad Khairi Ishak, Ayman Aljarbouh, Samih M. Mostafa

    Published 2024-11-01
    “…The hyperparameter tuning process employs the sparrow search algorithm (SSA) model to enhance the BBN model performance. …”
    Get full text
    Article
  3. 1123

    Pedestrian Re-Recognition Algorithm Based on Optimization Deep Learning-Sequence Memory Model by Feng-Ping An

    Published 2019-01-01
    “…Pedestrian re-recognition is an important research because it affects applications such as intelligent monitoring, content-based video retrieval, and human-computer interaction. …”
    Get full text
    Article
  4. 1124
  5. 1125

    Analysis of student’s final qualification theses using text loans detection systems by D. A. Petrusevich, K. D. Shakhardin

    Published 2019-05-01
    “…This research is actual because of the progress and development of new informational technologies used in the educational system. …”
    Get full text
    Article
  6. 1126

    Parameter Sensitivity Analysis and Algorithm Improvement of Optimization Scheduling Model for Cascade Pumping Stations by LIU Xiaolian, LI Zhenrong, WANG Xue-ni, ZHAI Yu, ZHANG Lei-ke, GUO Weiwei, TIAN Yu

    Published 2024-01-01
    “…The results could provide suggestions for the daily operation decision-making of the project. The TRUN algorithm was applied to the optimization scheduling research of cascade pump stations, and the results showed that TRUN had 67, 56 and 46 optimal values in 100 sets of comparison data for each single-stage pumping station, and the total number of optimal values had a clear advantage among the six algorithms, in the optimization results of single-stage pumping stations. …”
    Get full text
    Article
  7. 1127
  8. 1128
  9. 1129

    An artificial intelligence technique: experimental analysis of population-based physarum-energy optimization algorithm by Mehmet Fatih Demiral

    Published 2025-06-01
    “…To measure the effectiveness of the PEOs and the hybrids, the algorithms have been evaluated on several benchmark problems compared to the recent metaheuristics. …”
    Get full text
    Article
  10. 1130
  11. 1131

    Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding by Haiyong WANG, Mengning JI

    Published 2023-12-01
    “…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
    Get full text
    Article
  12. 1132

    A Sufficient Descent 3-Term Conjugate Gradient Method for Unconstrained Optimization Algorithm by Ghada Moayid Al-Naemi, Samaa AbdulQader

    Published 2023-12-01
    “…Despite the fact that the BRB algorithm achieved global convergence by employing a modified strong Wolfe line search, in this new MTTBRB-CG method the researchers employed the classical strong Wolfe-Powell condition (SWPC). …”
    Get full text
    Article
  13. 1133

    A node influence ranking algorithm combining k-shell iteration and node degree. by Yating Ji, Lequn Liu, Shujia Li, Pu Lu, Qimei Tang

    Published 2025-01-01
    “…To improve the K-shell decomposition method, many approaches have been proposed by researchers. However, there no algorithm has yet that simultaneously uses the iteration factor and degree to further distinguish nodes with the same K-shell value. …”
    Get full text
    Article
  14. 1134
  15. 1135

    Methodology сomparative statistical analysis of Russian industry based on cluster analysis by Sergey S. Shishulin

    Published 2017-07-01
    “…The article is devoted to researching of the possibilities of applying multidimensional statistical analysis in the study of industrial production on the basis of comparing its growth rates and structure with other developed and developing countries of the world. …”
    Get full text
    Article
  16. 1136

    Techno-Economic Analysis and Optimization of the Hybrid System for a Research Campus—Case Study Center for Research, Innovation, and Technology Transfer in Cuenca-Ecuador by Daniel Icaza-Alvarez, David Borge-Diez

    Published 2025-05-01
    “…Using data collected on site, particularly from the CIITT campus meteorological station and recorded on the RESMUCC platform, the size of each renewable system configuration is optimized based on the three proposed energy control algorithms. The designs of the different configurations developed using the Homer Pro tool are then compared in terms of costs and energy generated. …”
    Get full text
    Article
  17. 1137
  18. 1138
  19. 1139

    Evaluating the Efficiency of Gray Wolf Optimization and Colonial Competition Algorithm in Load Balancing of Distributed Systems by Asghar Molaei-Yeznabad, Amirhossein Dehghani

    Published 2025-03-01
    “…Comparative evaluations with algorithms like the Colonial Competitive Algorithm (CCA) provide a strong foundation for future research. …”
    Get full text
    Article
  20. 1140