-
541
Improved Genetic Algorithm for English Information Education and Teaching Quality Impact Analysis
Published 2022-01-01“…The system first proposes an improved parallel mechanism which computes the probability of population changing evolutionary strategies according to the algebra of population maintaining the optimal solution invariant. The evolution strategy needed by the population can be obtained by fuzzy reasoning according to the evolution degree and individual difference of the population so as to get rid of the local extreme value and search for the global optimal value. …”
Get full text
Article -
542
Towards a comprehensive view of the pocketome universe-biological implications and algorithmic challenges.
Published 2025-07-01“…We discuss the biological significance of this finding as well as identify critical and unmet algorithmic challenges.…”
Get full text
Article -
543
Differences between the European and Eurasian Good Pharmacovigilance Practices
Published 2021-07-01Get full text
Article -
544
Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm
Published 2014-01-01“…In addition to the regular operation, a mutation operator (MO) is designed to enhance the searching performance of the algorithm. The feasibility of the proposed method is demonstrated by various parameters of PV module under different environmental conditions, and the testing results are compared with other studied methods in terms of final solutions and computational time. …”
Get full text
Article -
545
A classifier-assisted evolutionary algorithm with knowledge transfer for expensive multitasking problems
Published 2025-05-01“…To be specific, a support vector classifier (SVC) is first developed and integrated into a classic evolutionary algorithm, i.e., covariance matrix adaptation evolution strategy (CMA-ES). …”
Get full text
Article -
546
An improved pelican optimization algorithm for function optimization and constrained engineering design problems
Published 2025-01-01“…These modifications are intended to keep the algorithm from being locked in local optima. The developed algorithm named as IPOA was tested using widely recognized twenty-three benchmark functions with a variety of characteristics, a set of CEC2022 test suites, and five different engineering constrained problems. …”
Get full text
Article -
547
Random Walk‐Based GOOSE Algorithm for Solving Engineering Structural Design Problems
Published 2025-05-01“…These benchmarks provide a diverse range of optimization landscapes, enabling comprehensive evaluation of IGOOSE algorithm performance under different problem complexities. …”
Get full text
Article -
548
Numerical approximation for algorithmic tangent moduli for nonlinear viscoelastic model with CSDA method
Published 2024-08-01“…After that, the idea of the CSDA is put to use in order to carry out a numerical evaluation of the algorithmic tangent moduli of a viscoelastic constitutive model. …”
Get full text
Article -
549
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
Get full text
Article -
550
Motion Planning and Tracking Control of Autonomous Vehicle Based on Improved A∗ Algorithm
Published 2022-01-01“…The resultant force generated by each potential field is further introduced into the evaluation function of A∗ algorithm to plan the driving path, which could be suitable for autonomous vehicles. …”
Get full text
Article -
551
Exploration and comparison of the effectiveness of swarm intelligence algorithm in early identification of cardiovascular disease
Published 2025-02-01“…This study systematically evaluated the performance of each feature selection algorithm under different population sizes, specifically by comparing their average running time and objective function values to identify the optimal feature subset. …”
Get full text
Article -
552
Deep learning-based object detection algorithms in medical imaging: Systematic review
Published 2025-01-01“…Our review of existing trends in DL-based object detection in medical images offers insights for future research directions. The continuous evolution of DL algorithms highlighted in the literature underscores the dynamic nature of this field, emphasizing the need for ongoing research and fitted optimization for specific applications.…”
Get full text
Article -
553
Radiological Semiotics of Different Types of Nontuberculous Pulmonary Mycobacterioses
Published 2022-07-01“…Objective: to determine, evaluate, and describe different radiological patterns of microbiologically identified nontuberculous pulmonary mycobacterioses (NTPM) based on multislice computed tomography data. …”
Get full text
Article -
554
Image information optimization processing based on fractional order differentiation and WT algorithm.
Published 2025-01-01“…Therefore, the study is based on wavelet transform algorithm and fractional order differentiation to perform edge detection and image fusion. …”
Get full text
Article -
555
A Novel Hierarchical Clustering Algorithm Based on Density Peaks for Complex Datasets
Published 2018-01-01“…Clustering aims to differentiate objects from different groups (clusters) by similarities or distances between pairs of objects. …”
Get full text
Article -
556
MOBCSA: Multi-Objective Binary Cuckoo Search Algorithm for Features Selection in Bioinformatics
Published 2024-01-01“…To assess MOBCSA’s performance, evaluation experiments were conducted on six benchmark biomedical datasets using three different classifiers. …”
Get full text
Article -
557
Outlier Detection of Photovoltaic Power Generation System Data Based on GMM-IF Algorithm
Published 2025-01-01“…Additionally, it integrates an Isolation Forest (IF) as the decision-making mechanism for detailed detection, further enhancing detection accuracy. Under different operating conditions and actual photovoltaic array datasets, comparative experiments were conducted using different evaluation metrics and algorithms to verify the effectiveness and superiority of the GMM-IF algorithm. …”
Get full text
Article -
558
Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks
Published 2016-02-01“…Furthermore, we study three different greedy algorithms under DAF_CSOR. Results of evaluation experiments show that the proposed sparsity-adaptive DAF_CSOR is relatively optimal in terms of recovery accuracy. …”
Get full text
Article -
559
Multi-Dimensional Feature Fusion and Enhanced Attention Streaming Movie Prediction Algorithm
Published 2025-05-01“…The experimental results show that the proposed algorithm FFLSTMEA achieves better prediction results with an average absolute error (MAE) of 3.50, a root mean square error (RMSE) of 5.28, and a coefficient of determination (R-squared) of 0.87 in the evaluation index. …”
Get full text
Article -
560
Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection
Published 2024-10-01“…This paper proposes an approach that operates on two different levels to address cybersecurity. On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
Get full text
Article