-
2681
Online Ensemble Using Adaptive Windowing for Data Streams with Concept Drift
Published 2016-05-01“…The ensembles for handling concept drift can be categorized into two different approaches: online and block-based approaches. …”
Get full text
Article -
2682
Indoor environmental quality assessment based on Interval-Valued Intuitionistic Fuzzy Linguistic Term Set TOPSIS method
Published 2025-08-01“…We define a new score function for comparing two or more different IVIFLTS, along with the proof of the algorithm and properties of IVIFLTS. …”
Get full text
Article -
2683
Maintaining the coverage of a satellite multibeam hybrid reflector antenna by monitoring the current reflector state using signals of on-ground beacon
Published 2024-01-01“…In the paper, we propose an algorithm within the so-called best-fit paraboloid ideology, identify factors that can slow down its convergence, and evaluate the efficiency of electronic adaptation that can be achieved with it. …”
Get full text
Article -
2684
Dynamics and Chaos Intensity Analysis of Under-Actuated Mechanism by Uniformity and Particle Swarm Optimization
Published 2024-11-01“…To solve this problem, uniformity is used to evaluate the chaos intensity of the system. Finally, based on uniformity, the particle swarm optimization algorithm successfully achieves the suppression and enhancement of the chaos intensity of the closed-chain under-actuated five-bar mechanism by optimizing its linkage length and driving speed, and the results are verified by the experimental platform.…”
Get full text
Article -
2685
Dynamics Modeling and Control of a Quadrotor with Swing Load
Published 2014-01-01“…So, the purpose of this research is proposing and designing an antiswing control algorithm for the suspended load. To this end, control and stabilization of the quadrotor are necessary for designing the antiswing controller. …”
Get full text
Article -
2686
Enhancing maize streak virus detection: a comparative analysis of Sentinel-2 MSI and Landsat 9 OLI data across vegetative and reproductive growth stages
Published 2025-12-01“…Maize streak virus (MSV) threatens food production in Africa and globally. This study evaluates the effectiveness of Sentinel-2 MSI and Landsat 9 in detecting MSV-infected maize at different growth stages in Ofcolaco farms, Tzaneen, South Africa, using the Random Forest algorithm in Google Earth Engine. …”
Get full text
Article -
2687
Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning
Published 2024-01-01“…These vectors are then used to train different Machine Learning algorithms for detecting and classifying malware. …”
Get full text
Article -
2688
An Enhanced Adaptive Kalman Filter for Multibody Model Observation
Published 2025-04-01“…One of the most tricky questions with the different approaches tested in the literature is the parameter tuning of the filters, in particular, the covariance matrix of the plant noise. …”
Get full text
Article -
2689
Persistent Homology Combined with Machine Learning for Social Network Activity Analysis
Published 2024-12-01“…The results show that the proposed algorithm can effectively classify social network users into different groups, which provides a good foundation for further research and application.…”
Get full text
Article -
2690
Exploring machine learning classification for community based health insurance enrollment in Ethiopia
Published 2025-07-01“…Receiver operating characteristic curves and other metrics were used to evaluate each model’s accuracy.ResultsThe RF algorithm was determined to be the best machine learning model based on different performance assessments. …”
Get full text
Article -
2691
ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks
Published 2021-04-01“…We evaluated these clothing works generated from different models by computing inception score (IS), human prefer score (HPS) and generated score (IS and HPS). …”
Get full text
Article -
2692
Stability Analysis and Support Optimization of Tunnel Surrounding Rock with Weak Interlayer Based on Catastrophe Theory
Published 2025-02-01“…A tunnel excavation model with weak interlayers is established to analyze the effect of different angles and thicknesses on the displacement of the surrounding rock. …”
Get full text
Article -
2693
DRL-based Joint Beamforming and Power Allocation in Beyond Diagonal Reconfigurable Intelligence Surface 6G Systems
Published 2025-03-01“…Additionally, we analyze the convergence speed and performance trade-offs of different DRL algorithms, emphasizing the importance of selecting the appropriate algorithm and hyper-parameters for specific applications. …”
Get full text
Article -
2694
Optimizing decentralized implementation of state estimation in active distribution networks
Published 2024-11-01“…For this purpose, initially, an algorithm is used to partition the network into all possible configurations with different sizes. …”
Get full text
Article -
2695
An Intelligent System for Light and Air Conditioner Control Using YOLOv8
Published 2024-12-01“…This study aims to develop and evaluate a system that employs a camera integrated with the YOLOv8 algorithm to detect human presence and optimize energy usage by controlling lights and air conditioning. …”
Get full text
Article -
2696
A WiFi RSSI ranking fingerprint positioning system and its application to indoor activities of daily living recognition
Published 2019-04-01“…First, an access point selection based on a genetic algorithm is applied to reduce the positioning computational cost and increase the positioning accuracy. …”
Get full text
Article -
2697
Defect detection based on extreme edge of defective region histogram
Published 2018-01-01“…To evaluate the proposed defect-detection method, common standard images for experimentation were used. …”
Get full text
Article -
2698
An efficient supervised framework for music mood recognition using autoencoder‐based optimised support vector regression model
Published 2021-04-01“…Using the K‐Medoid‐based brain storm algorithm, the optimal parameters of the SVR are selected. …”
Get full text
Article -
2699
Web application firewall based on machine learning models
Published 2025-07-01“…A hybrid dataset, including CISC 2010, HTTPParams 2015, and real-time Hypertext Transfer Protocol (HTTP) requests, was employed. The study evaluated five classification algorithms—K-nearest neighbors, logistic regression, naïve Bayes, support vector machine, and decision tree—for detecting cross site scripting (XSS), Structured Query Language (SQL) Injection, Operating System Command Injection, and Local File Inclusion attacks. …”
Get full text
Article -
2700
Dynamic Capacitated Arc Routing Problem in E-Bike Sharing System: A Monte Carlo Tree Search Approach
Published 2021-01-01“…A Monte Carlo Tree Search algorithm is also used to improve the simulation efficiency. …”
Get full text
Article