Showing 381 - 400 results of 4,946 for search 'different (evolution OR evaluation) algorithm', query time: 0.20s Refine Results
  1. 381

    Vulnerability benchmark generation algorithm based on finite state machines by XIE Yuandong, YAN Xuexiong, ZHAO Guangsheng, ZHAO Xu, QIU Han

    Published 2025-06-01
    “…Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. This study validates the algorithm’s effectiveness and practical utility, confirming that it provides a more comprehensive and realistic benchmark for evaluating vulnerability detection tools.…”
    Get full text
    Article
  2. 382

    Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification by Pouya Koureh Davoodi, Farnusch Hajizadeh, Mohammad Rezaei

    Published 2025-08-01
    “…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
    Get full text
    Article
  3. 383

    Realization and discussion of selected artificial intelligence algorithms in computer games by Yurii Tyshchenko

    Published 2025-03-01
    “…The aim is to evaluate the efficiency and learning ability across different scenarios, such as Blackjack and Poker Limit Hold'em. …”
    Get full text
    Article
  4. 384

    Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement by Mohammad Ismail, Zohair Al-Ameen

    Published 2022-06-01
    “…Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. …”
    Get full text
    Article
  5. 385

    A Reliable Application of MPC for Securing the Tri-Training Algorithm by Hendra Kurniawan, Masahiro Mambo

    Published 2023-01-01
    “…The simulation results show that tri-training in secure MPC has almost same accuracy compared to original tri-training algorithm. We also compare execution time in addition to performance evaluation of tri-training in secure and the original tri-training algorithms.…”
    Get full text
    Article
  6. 386

    Identification of maize kernel varieties based on interpretable ensemble algorithms by Chunguang Bi, Chunguang Bi, Xinhua Bi, Jinjing Liu, Hao Xie, Shuo Zhang, He Chen, Mohan Wang, Lei Shi, Lei Shi, Shaozhong Song

    Published 2025-02-01
    “…The base learner of the Stacking integration model was selected using diversity and performance indices, with parameters optimized through a differential evolution algorithm incorporating multiple mutation strategies and dynamic adjustment of mutation factors and recombination rates. …”
    Get full text
    Article
  7. 387

    Firefly Algorithm based Feature Selection for Arabic Text Classification by Souad Larabi Marie-Sainte, Nada Alalyani

    Published 2020-03-01
    “…This algorithm has been successfully applied in different combinatorial problems. …”
    Get full text
    Article
  8. 388

    Enhancing breast cancer diagnosis through machine learning algorithms by Javad Amraei, Aboulfazl Mirzapoor, Kiomars Motarjem, Mohammad Abdolahad

    Published 2025-07-01
    “…In this research has done extensive algorithm evaluation like SVM, DT, RF, Logistic regression, KNN and ANN using datasets CDP Breast Cancer. …”
    Get full text
    Article
  9. 389

    Human activity recognition algorithms for manual material handling activities by Andreas Sochopoulos, Tommaso Poliero, Jamil Ahmad, Darwin G. Caldwell, Christian Di Natali

    Published 2025-03-01
    “…HAR using IMUs can aid both the ergonomic evaluation of the performed activities and, more recently, with the development of exoskeleton technologies, can assist with the selection of precisely tailored assisting strategies. …”
    Get full text
    Article
  10. 390

    Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm by Youle Song, Yuting Duan, Tong Rao

    Published 2025-07-01
    “…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
    Get full text
    Article
  11. 391

    A lightweight 256 hexadecimal character substitution Cipher algorithm by Ibrahim Lawal, Musa Yusuf, Adamu Sulaiman Usman, Oluwasegun Ishaya Adelaiye

    Published 2025-07-01
    “…The aim of this study was achieved by the following objectives; a design of the HCSC algorithm, an implementation of the proposed HCSC algorithm using python programming language and the evaluation of its performance in comparison with existing study. …”
    Get full text
    Article
  12. 392
  13. 393

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
    Get full text
    Article
  14. 394

    SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm by Mujdat Soyturk, Deniz Turgay Altilar

    Published 2012-02-01
    “…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
    Get full text
    Article
  15. 395

    RLS-Based Control Algorithms for 3D Zones of Quiet by Małgorzata I. MICHALCZYK, Janusz SERWIN

    Published 2008-12-01
    “…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
    Get full text
    Article
  16. 396

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  17. 397

    Improved Image Compression Scheme Using Hybrid Encoding Algorithm by Yusra Ahmed Salih, Aree Ali Mohammed, Loay Edwar George

    Published 2019-10-01
    “…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
    Get full text
    Article
  18. 398

    Topology of Complex Networks and Performance Limitations of Community Detection Algorithms by Muhammad Qasim Pasta, Faraz Zaidi

    Published 2017-01-01
    “…In this paper, we attempt to highlight this problem by studying networks with different topologies and evaluate the performance of community detection algorithms in the light of these topological changes. …”
    Get full text
    Article
  19. 399

    APPLICATION OF THE WORD2VEC ALGORITHM FOR CLINICAL DIAGNOSIS DETERMINATION by Uzeyir Gurbanli

    Published 2025-02-01
    “…It also focuses on evaluating the quality of diagnostic and treatment processes through applıcation of different methods and practical application. …”
    Get full text
    Article
  20. 400

    New Photoplethysmographic Signal Analysis Algorithm for Arterial Stiffness Estimation by Kristjan Pilt, Rain Ferenets, Kalju Meigas, Lars-Göran Lindberg, Kristina Temitski, Margus Viigimaa

    Published 2013-01-01
    “…The “ageing index” (AGI), which is calculated from the second derivative photoplethysmographic (SDPPG) waveform, has been used as one method for arterial stiffness estimation and the evaluation of cardiovascular ageing. In this study, the new SDPPG analysis algorithm is proposed with optimal filtering and signal normalization in time. …”
    Get full text
    Article