Showing 541 - 560 results of 4,946 for search 'different (evolution OR evaluation) algorithm', query time: 0.28s Refine Results
  1. 541

    Improved Genetic Algorithm for English Information Education and Teaching Quality Impact Analysis by Yuanbo Li, Wanhe Song

    Published 2022-01-01
    “…The system first proposes an improved parallel mechanism which computes the probability of population changing evolutionary strategies according to the algebra of population maintaining the optimal solution invariant. The evolution strategy needed by the population can be obtained by fuzzy reasoning according to the evolution degree and individual difference of the population so as to get rid of the local extreme value and search for the global optimal value. …”
    Get full text
    Article
  2. 542

    Towards a comprehensive view of the pocketome universe-biological implications and algorithmic challenges. by Hanne Zillmer, Dirk Walther

    Published 2025-07-01
    “…We discuss the biological significance of this finding as well as identify critical and unmet algorithmic challenges.…”
    Get full text
    Article
  3. 543
  4. 544

    Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm by Wei Han, Hong-Hua Wang, Ling Chen

    Published 2014-01-01
    “…In addition to the regular operation, a mutation operator (MO) is designed to enhance the searching performance of the algorithm. The feasibility of the proposed method is demonstrated by various parameters of PV module under different environmental conditions, and the testing results are compared with other studied methods in terms of final solutions and computational time. …”
    Get full text
    Article
  5. 545

    A classifier-assisted evolutionary algorithm with knowledge transfer for expensive multitasking problems by Min Hu, Zhigang Ren, Zhirui Cao, Yifeng Guo, Haitao Sun, Hongyao Zhou, Yu Guo

    Published 2025-05-01
    “…To be specific, a support vector classifier (SVC) is first developed and integrated into a classic evolutionary algorithm, i.e., covariance matrix adaptation evolution strategy (CMA-ES). …”
    Get full text
    Article
  6. 546

    An improved pelican optimization algorithm for function optimization and constrained engineering design problems by Haval Tariq Sadeeq, Araz Abrahim, Thamer Hameed, Najdavan Kako, Reber Mohammed, Dindar Ahmed

    Published 2025-01-01
    “…These modifications are intended to keep the algorithm from being locked in local optima. The developed algorithm named as IPOA was tested using widely recognized twenty-three benchmark functions with a variety of characteristics, a set of CEC2022 test suites, and five different engineering constrained problems. …”
    Get full text
    Article
  7. 547

    Random Walk‐Based GOOSE Algorithm for Solving Engineering Structural Design Problems by Sripathi Mounika, Himanshu Sharma, Aradhala Bala Krishna, Krishan Arora, Syed Immamul Ansarullah, Ayodeji Olalekan Salau

    Published 2025-05-01
    “…These benchmarks provide a diverse range of optimization landscapes, enabling comprehensive evaluation of IGOOSE algorithm performance under different problem complexities. …”
    Get full text
    Article
  8. 548

    Numerical approximation for algorithmic tangent moduli for nonlinear viscoelastic model with CSDA method by Xinggui Fan, Jinsheng Xu, Xiong Chen

    Published 2024-08-01
    “…After that, the idea of the CSDA is put to use in order to carry out a numerical evaluation of the algorithmic tangent moduli of a viscoelastic constitutive model. …”
    Get full text
    Article
  9. 549

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  10. 550

    Motion Planning and Tracking Control of Autonomous Vehicle Based on Improved A∗ Algorithm by Yunlong Bai, Gang Li, Ning Li

    Published 2022-01-01
    “…The resultant force generated by each potential field is further introduced into the evaluation function of A∗ algorithm to plan the driving path, which could be suitable for autonomous vehicles. …”
    Get full text
    Article
  11. 551

    Exploration and comparison of the effectiveness of swarm intelligence algorithm in early identification of cardiovascular disease by Tiantian Bai, Mengru Xu, Taotao Zhang, Xianjie Jia, Fuzhi Wang, Xiuling Jiang, Xing Wei

    Published 2025-02-01
    “…This study systematically evaluated the performance of each feature selection algorithm under different population sizes, specifically by comparing their average running time and objective function values to identify the optimal feature subset. …”
    Get full text
    Article
  12. 552

    Deep learning-based object detection algorithms in medical imaging: Systematic review by Carina Albuquerque, Roberto Henriques, Mauro Castelli

    Published 2025-01-01
    “…Our review of existing trends in DL-based object detection in medical images offers insights for future research directions. The continuous evolution of DL algorithms highlighted in the literature underscores the dynamic nature of this field, emphasizing the need for ongoing research and fitted optimization for specific applications.…”
    Get full text
    Article
  13. 553

    Radiological Semiotics of Different Types of Nontuberculous Pulmonary Mycobacterioses by R. B. Amansakhedov, L. I. Dmitrieva, T. G. Smirnova, A. D. Egorova, A. E. Ergeshov

    Published 2022-07-01
    “…Objective: to determine, evaluate, and describe different radiological patterns of microbiologically identified nontuberculous pulmonary mycobacterioses (NTPM) based on multislice computed tomography data.   …”
    Get full text
    Article
  14. 554

    Image information optimization processing based on fractional order differentiation and WT algorithm. by Qiong Long

    Published 2025-01-01
    “…Therefore, the study is based on wavelet transform algorithm and fractional order differentiation to perform edge detection and image fusion. …”
    Get full text
    Article
  15. 555

    A Novel Hierarchical Clustering Algorithm Based on Density Peaks for Complex Datasets by Rong Zhou, Yong Zhang, Shengzhong Feng, Nurbol Luktarhan

    Published 2018-01-01
    “…Clustering aims to differentiate objects from different groups (clusters) by similarities or distances between pairs of objects. …”
    Get full text
    Article
  16. 556

    MOBCSA: Multi-Objective Binary Cuckoo Search Algorithm for Features Selection in Bioinformatics by Hudhaifa Mohammed Abdulwahab, S. Ajitha, Mufeed Ahmed Naji Saif, Belal Abdullah Hezam Murshed, Fahd A. Ghanem

    Published 2024-01-01
    “…To assess MOBCSA&#x2019;s performance, evaluation experiments were conducted on six benchmark biomedical datasets using three different classifiers. …”
    Get full text
    Article
  17. 557

    Outlier Detection of Photovoltaic Power Generation System Data Based on GMM-IF Algorithm by Xin Li, Guoxin Du, Yuman Li, Zengqiang Ma, Lihu Liu, Minglong Jiang, Feiyu Liu, Tianming Mu

    Published 2025-01-01
    “…Additionally, it integrates an Isolation Forest (IF) as the decision-making mechanism for detailed detection, further enhancing detection accuracy. Under different operating conditions and actual photovoltaic array datasets, comparative experiments were conducted using different evaluation metrics and algorithms to verify the effectiveness and superiority of the GMM-IF algorithm. …”
    Get full text
    Article
  18. 558

    Energy-Efficient Data Recovery via Greedy Algorithm for Wireless Sensor Networks by Zhi-qiang Zou, Ze-ting Li, Shu Shen, Ru-chuan Wang

    Published 2016-02-01
    “…Furthermore, we study three different greedy algorithms under DAF_CSOR. Results of evaluation experiments show that the proposed sparsity-adaptive DAF_CSOR is relatively optimal in terms of recovery accuracy. …”
    Get full text
    Article
  19. 559

    Multi-Dimensional Feature Fusion and Enhanced Attention Streaming Movie Prediction Algorithm by Hanqing Hu, Tianmu Tian, Chengjing Liu, Xueyuan Bai

    Published 2025-05-01
    “…The experimental results show that the proposed algorithm FFLSTMEA achieves better prediction results with an average absolute error (MAE) of 3.50, a root mean square error (RMSE) of 5.28, and a coefficient of determination (R-squared) of 0.87 in the evaluation index. …”
    Get full text
    Article
  20. 560

    Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection by Marwan Haruna, Kaleb Gebremichael Gebremeskel, Martina Troscia, Alexandr Tardo, Paolo Pagano

    Published 2024-10-01
    “…This paper proposes an approach that operates on two different levels to address cybersecurity. On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. …”
    Get full text
    Article