Showing 2,681 - 2,700 results of 4,558 for search 'different evaluation algorithm', query time: 0.21s Refine Results
  1. 2681

    Online Ensemble Using Adaptive Windowing for Data Streams with Concept Drift by Yange Sun, Zhihai Wang, Haiyang Liu, Chao Du, Jidong Yuan

    Published 2016-05-01
    “…The ensembles for handling concept drift can be categorized into two different approaches: online and block-based approaches. …”
    Get full text
    Article
  2. 2682

    Indoor environmental quality assessment based on Interval-Valued Intuitionistic Fuzzy Linguistic Term Set TOPSIS method by Zhiyuan Tu, Mengdi Xu, RuFei Ma, Min Li, Hao Xu

    Published 2025-08-01
    “…We define a new score function for comparing two or more different IVIFLTS, along with the proof of the algorithm and properties of IVIFLTS. …”
    Get full text
    Article
  3. 2683

    Maintaining the coverage of a satellite multibeam hybrid reflector antenna by monitoring the current reflector state using signals of on-ground beacon by A. V. Dardymov, Yu. I. Choni, A. G. Romanov, I. Yu. Danilov

    Published 2024-01-01
    “…In the paper, we propose an algorithm within the so-called best-fit paraboloid ideology, identify factors that can slow down its convergence, and evaluate the efficiency of electronic adaptation that can be achieved with it. …”
    Get full text
    Article
  4. 2684

    Dynamics and Chaos Intensity Analysis of Under-Actuated Mechanism by Uniformity and Particle Swarm Optimization by Hui Li, Yang Shu, Yongping Gu, Wuye Xiang, Feng Zhang

    Published 2024-11-01
    “…To solve this problem, uniformity is used to evaluate the chaos intensity of the system. Finally, based on uniformity, the particle swarm optimization algorithm successfully achieves the suppression and enhancement of the chaos intensity of the closed-chain under-actuated five-bar mechanism by optimizing its linkage length and driving speed, and the results are verified by the experimental platform.…”
    Get full text
    Article
  5. 2685

    Dynamics Modeling and Control of a Quadrotor with Swing Load by S. Sadr, S. Ali A. Moosavian, P. Zarafshan

    Published 2014-01-01
    “…So, the purpose of this research is proposing and designing an antiswing control algorithm for the suspended load. To this end, control and stabilization of the quadrotor are necessary for designing the antiswing controller. …”
    Get full text
    Article
  6. 2686

    Enhancing maize streak virus detection: a comparative analysis of Sentinel-2 MSI and Landsat 9 OLI data across vegetative and reproductive growth stages by Thabiso Jack Choshi, Inos Dhau, Frederick Mashao

    Published 2025-12-01
    “…Maize streak virus (MSV) threatens food production in Africa and globally. This study evaluates the effectiveness of Sentinel-2 MSI and Landsat 9 in detecting MSV-infected maize at different growth stages in Ofcolaco farms, Tzaneen, South Africa, using the Random Forest algorithm in Google Earth Engine. …”
    Get full text
    Article
  7. 2687

    Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning by Wafaa Al-Kahla, Eyad Taqieddin, Ahmed S. Shatnawi, Rami Al-Ouran

    Published 2024-01-01
    “…These vectors are then used to train different Machine Learning algorithms for detecting and classifying malware. …”
    Get full text
    Article
  8. 2688

    An Enhanced Adaptive Kalman Filter for Multibody Model Observation by Antonio J. Rodríguez, Emilio Sanjurjo, Miguel Ángel Naya

    Published 2025-04-01
    “…One of the most tricky questions with the different approaches tested in the literature is the parameter tuning of the filters, in particular, the covariance matrix of the plant noise. …”
    Get full text
    Article
  9. 2689

    Persistent Homology Combined with Machine Learning for Social Network Activity Analysis by Zhijian Zhang, Yuqing Sun, Yayun Liu, Lin Jiang, Zhengmi Li

    Published 2024-12-01
    “…The results show that the proposed algorithm can effectively classify social network users into different groups, which provides a good foundation for further research and application.…”
    Get full text
    Article
  10. 2690

    Exploring machine learning classification for community based health insurance enrollment in Ethiopia by Seyifemickael Amare Yilema, Seyifemickael Amare Yilema, Yegnanew A. Shiferaw, Yikeber Abebaw Moyehodie, Setegn Muche Fenta, Denekew Bitew Belay, Denekew Bitew Belay, Haile Mekonnen Fenta, Haile Mekonnen Fenta, Teshager Zerihun Nigussie, Ding-Geng Chen, Ding-Geng Chen

    Published 2025-07-01
    “…Receiver operating characteristic curves and other metrics were used to evaluate each model’s accuracy.ResultsThe RF algorithm was determined to be the best machine learning model based on different performance assessments. …”
    Get full text
    Article
  11. 2691

    ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks by Qiang Wu, Baixue Zhu, Binbin Yong, Yongqiang Wei, Xuetao Jiang, Rui Zhou, Qingguo Zhou

    Published 2021-04-01
    “…We evaluated these clothing works generated from different models by computing inception score (IS), human prefer score (HPS) and generated score (IS and HPS). …”
    Get full text
    Article
  12. 2692

    Stability Analysis and Support Optimization of Tunnel Surrounding Rock with Weak Interlayer Based on Catastrophe Theory by Tuo Zhang, Jinhai Zhao, Renfei Kuang, Chengyang Li

    Published 2025-02-01
    “…A tunnel excavation model with weak interlayers is established to analyze the effect of different angles and thicknesses on the displacement of the surrounding rock. …”
    Get full text
    Article
  13. 2693

    DRL-based Joint Beamforming and Power Allocation in Beyond Diagonal Reconfigurable Intelligence Surface 6G Systems by Mousa Abdollahvand, Sima Sobhi-givi

    Published 2025-03-01
    “…Additionally, we analyze the convergence speed and performance trade-offs of different DRL algorithms, emphasizing the importance of selecting the appropriate algorithm and hyper-parameters for specific applications. …”
    Get full text
    Article
  14. 2694

    Optimizing decentralized implementation of state estimation in active distribution networks by Mohammad Gholami, Aref Eskandari, Sajjad Fattaheian‐Dehkordi, Matti Lehtonen

    Published 2024-11-01
    “…For this purpose, initially, an algorithm is used to partition the network into all possible configurations with different sizes. …”
    Get full text
    Article
  15. 2695

    An Intelligent System for Light and Air Conditioner Control Using YOLOv8 by Ikharochman Tri Utomo, Muhammad Nauval Firdaus, Sisdarmanto Adinandra, Suatmi Murnani

    Published 2024-12-01
    “…This study aims to develop and evaluate a system that employs a camera integrated with the YOLOv8 algorithm to detect human presence and optimize energy usage by controlling lights and air conditioning. …”
    Get full text
    Article
  16. 2696

    A WiFi RSSI ranking fingerprint positioning system and its application to indoor activities of daily living recognition by Zixiang Ma, Bang Wu, Stefan Poslad

    Published 2019-04-01
    “…First, an access point selection based on a genetic algorithm is applied to reduce the positioning computational cost and increase the positioning accuracy. …”
    Get full text
    Article
  17. 2697

    Defect detection based on extreme edge of defective region histogram by Zouhir Wakaf, Hamid A. Jalab

    Published 2018-01-01
    “…To evaluate the proposed defect-detection method, common standard images for experimentation were used. …”
    Get full text
    Article
  18. 2698

    An efficient supervised framework for music mood recognition using autoencoder‐based optimised support vector regression model by Gaurav Agarwal, Hari Om

    Published 2021-04-01
    “…Using the K‐Medoid‐based brain storm algorithm, the optimal parameters of the SVR are selected. …”
    Get full text
    Article
  19. 2699

    Web application firewall based on machine learning models by Muhammed Ersin Durmuşkaya, Selim Bayraklı

    Published 2025-07-01
    “…A hybrid dataset, including CISC 2010, HTTPParams 2015, and real-time Hypertext Transfer Protocol (HTTP) requests, was employed. The study evaluated five classification algorithms—K-nearest neighbors, logistic regression, naïve Bayes, support vector machine, and decision tree—for detecting cross site scripting (XSS), Structured Query Language (SQL) Injection, Operating System Command Injection, and Local File Inclusion attacks. …”
    Get full text
    Article
  20. 2700

    Dynamic Capacitated Arc Routing Problem in E-Bike Sharing System: A Monte Carlo Tree Search Approach by Shiqi Tan, Zhiheng Li, Na Xie

    Published 2021-01-01
    “…A Monte Carlo Tree Search algorithm is also used to improve the simulation efficiency. …”
    Get full text
    Article