Showing 2,941 - 2,960 results of 4,946 for search 'different (evolution OR evaluation) algorithm', query time: 0.14s Refine Results
  1. 2941

    Fracture toughness of rough and frictional cracks emanating from a re-entrant corner by Andrea Carpinteri, Andrea Spagnoli, Michele Terzano, Sabrina Vantadori

    Published 2017-07-01
    “…In mixed-mode conditions, the competing contribution of the different stress intensity factors predicts fracture initiation load as well as crack propagation direction. …”
    Get full text
    Article
  2. 2942

    A fuzzy irregular cellular automata-based method for the vertex colouring problem by Mostafa Kashani, Saeid Gorgin, Seyed Vahab Shojaedini

    Published 2020-01-01
    “…The results suggest that the proposed method is able to achieve better results in terms of the minimum number of required colours and the execution time of the algorithm, compared to other peer algorithms.…”
    Get full text
    Article
  3. 2943

    Multi-Channel Fusion Decision-Making Online Detection Network for Surface Defects in Automotive Pipelines Based on Transfer Learning VGG16 Network by Jian Song, Yingzhong Tian, Xiang Wan

    Published 2024-12-01
    “…Each channel of the network is designed according to the characteristics of different types of defects. Dynamic weights are assigned to achieve decision-level fusion through the use of a matrix of indicators to evaluate the performance of each channel’s recognition ability. …”
    Get full text
    Article
  4. 2944

    A vehicular network–based intelligent transport system for smart cities by Tayyaba Zaheer, Asad Waqar Malik, Anis Ur Rahman, Ayesha Zahir, Muhammad Moazam Fraz

    Published 2019-11-01
    “…The framework was evaluated on different fixed route-selection and dynamic route-selection algorithms in terms of resource usage, transmission delay, packet loss, and overall travel time. …”
    Get full text
    Article
  5. 2945

    Impact Localization System of CFRP Structure Based on EFPI Sensors by Junsong Yu, Zipeng Peng, Linghui Gan, Jun Liu, Yufang Bai, Shengpeng Wan

    Published 2025-02-01
    “…The model is trained using the training set, with its parameters optimized using the sand cat swarm optimization algorithm and validation set. The localization performance of different models is then evaluated and compared using the test set. …”
    Get full text
    Article
  6. 2946

    YOLOv9: A High-Performance Deep Learning Approach for Asphalt Pavement Distresses Detection in Roadway Images by Fahrizal, Siti Nurjanah, Yoan Purbolingga, Dila Marta Putri, Asde Rahmawati, Bastul Wajhi Akramunnas, Muhidin Arifin

    Published 2025-06-01
    “…This study proposes employing the deep learning algorithm YOLOv9, the latest You Only Look Once (YOLO) version, for identifying asphalt pavement distresses. …”
    Get full text
    Article
  7. 2947

    Prediction of Moisture Content in Kiwi (Actinidia deliciosa) Dried Using Machine Learning Approaches by Halil Nusret BULUS, Soner CELEN

    Published 2025-03-01
    “…In this study, kiwi slices of three different thicknesses were dried using 90 W microwave power. …”
    Get full text
    Article
  8. 2948

    A Computational Offloading Method for Edge Server Computing and Resource Allocation Management by Muna Al-Razgan, Taha Alfakih, Mohammad Mehedi Hassan

    Published 2021-01-01
    “…In this study, we proposed a model to evaluate the efficiency of the close-end network computation offloading in MEC. …”
    Get full text
    Article
  9. 2949

    Study on energy saving strategy and Nash equilibrium of base station in cognitive radio network by Xiao-tong MA, Shun-fu JIN, Jian-ping LIU, Zhan-qiang HUO

    Published 2016-07-01
    “…In view of different system parameters, the system experiment was carried out to validate the rationality of the pricing policy.…”
    Get full text
    Article
  10. 2950

    Estimating the Capacity of Urban Transportation Networks with an Improved Sensitivity Based Method by Muqing Du, Xiaowei Jiang, Lin Cheng

    Published 2015-01-01
    “…The high-efficient origin-based (OB) algorithm is extended for the precise solution of the combined model which is integrated in the network capacity model. …”
    Get full text
    Article
  11. 2951

    Study on energy saving strategy and Nash equilibrium of base station in cognitive radio network by Xiao-tong MA, Shun-fu JIN, Jian-ping LIU, Zhan-qiang HUO

    Published 2016-07-01
    “…In view of different system parameters, the system experiment was carried out to validate the rationality of the pricing policy.…”
    Get full text
    Article
  12. 2952

    LABORATORY OF CLINICAL IMMUNOLOGY N.V. SKLIFOSOVSKY RESEARCH INSTITUTE FOR EMERGENCY MEDICINE (HISTORY AND PRESENT) by M. A. Godkov, G. V. Bulava

    Published 2016-03-01
    “…This complex allows to fully and adequately evaluate the condition of the immune system of patients at different stages of traumatic disease and after transplantation of organs and tissues , to forecast the probability of septic complications developing, adjust the therapy . …”
    Get full text
    Article
  13. 2953

    Methodological aspects of statistical analysis in ophthalmology by A. S. Sorokin, S. Yu. Petrov, N. V. Zvezdina, M. A. Golovanova

    Published 2023-10-01
    “…Statistics can be used to evaluate the prevalence of diseases, differences between patient groups, links between test results, compare the effectiveness of different types of treatment, test the hypothesis and model the interdependencies between variables. …”
    Get full text
    Article
  14. 2954

    User preference–based QoS-aware service function placement in IoT-Edge cloud by Briytone Mutichiro, Younghan Kim

    Published 2021-05-01
    “…The proposed solutions are evaluated based on different metrics and the obtained results show the gap between the heuristic user preference placement algorithm and the optimal solution to be minimal.…”
    Get full text
    Article
  15. 2955

    Security performance analysis for cell-free massive multiple-input multiple-output system with multi-antenna access points deployment in presence of active eavesdropping by Xiaoyu Wang, Yuanyuan Gao, Guangna Zhang, Mingxi Guo, Kui Xu

    Published 2022-08-01
    “…Assuming a malicious active eavesdropper having knowledge of instantaneous channel state information, we derive the asymptotic closed-form expression of the achievable secrecy rate, which is used to evaluate network security performance. A distributed power allocation scheme is developed based on channel fading degrees of different users. …”
    Get full text
    Article
  16. 2956

    How a distractor influences fixations during the exploration of natural scenes by Hélène Devillez, Anne Guérin-Dugué, Nathalie Guyader

    Published 2017-04-01
    “…We also propose a simple mixture model evaluated using the Expectation-Maximization algorithm to test the distractor effect on fixation locations, including fixations which did not land on the distractor. …”
    Get full text
    Article
  17. 2957

    Prediction of rock type from physical and mechanical properties by data mining implementations by Fatih Bayram

    Published 2025-05-01
    “…The paper’s main objective is to present the applicability of data mining algorithms in rock type determination. The physical and mechanical properties of the rocks were evaluated with different data mining algorithms, and the rock types were predicted 95.6% correctly with the model generated with the Support Vector Machine algorithm. …”
    Get full text
    Article
  18. 2958

    On the Minimum Dataset Requirements for Fine-Tuning an Object Detector for Arable Crop Plant Counting: A Case Study on Maize Seedlings by Samuele Bumbaca, Enrico Borgogno-Mondino

    Published 2025-06-01
    “…This study investigated how much annotated data is required to achieve standard counting accuracy (R<sup>2</sup> = 0.85) for maize seedlings across different object detection approaches. We systematically evaluated traditional deep learning models requiring many training examples (YOLOv5, YOLOv8, YOLO11, RT-DETR), newer approaches requiring few examples (CD-ViTO), and methods requiring zero labeled examples (OWLv2) using drone-captured orthomosaic RGB imagery. …”
    Get full text
    Article
  19. 2959

    Predicting antimicrobial mechanism-of-action from transcriptomes: A generalizable explainable artificial intelligence approach. by Josh L Espinoza, Chris L Dupont, Aubrie O'Rourke, Sinem Beyhan, Pavel Morales, Amy Spoering, Kirsten J Meyer, Agnes P Chan, Yongwook Choi, William C Nierman, Kim Lewis, Karen E Nelson

    Published 2021-03-01
    “…We evaluated our methods using whole transcriptome responses from Escherichia coli challenged with 41 known antibiotics and 9 crude extracts while depositing 122 transcriptomes unique to this study. …”
    Get full text
    Article
  20. 2960

    Machine Learning Approach for Ground-Level Estimation of Electromagnetic Radiation in the Near Field of 5G Base Stations by Oluwole John Famoriji, Thokozani Shongwe

    Published 2025-06-01
    “…Because a machine learning algorithm is trained by utilizing data obtained from numerous 5G base stations, it exhibits the capability to estimate the strength of the electric field effectively at every point of arbitrary radiation, while the base station generates a network and serves various numbers of 5G terminals running in different modes of service. …”
    Get full text
    Article