Showing 2,681 - 2,700 results of 4,558 for search 'different evaluation algorithm', query time: 0.14s Refine Results
  1. 2681

    Online Ensemble Using Adaptive Windowing for Data Streams with Concept Drift by Yange Sun, Zhihai Wang, Haiyang Liu, Chao Du, Jidong Yuan

    Published 2016-05-01
    “…The ensembles for handling concept drift can be categorized into two different approaches: online and block-based approaches. …”
    Get full text
    Article
  2. 2682

    Indoor environmental quality assessment based on Interval-Valued Intuitionistic Fuzzy Linguistic Term Set TOPSIS method by Zhiyuan Tu, Mengdi Xu, RuFei Ma, Min Li, Hao Xu

    Published 2025-08-01
    “…We define a new score function for comparing two or more different IVIFLTS, along with the proof of the algorithm and properties of IVIFLTS. …”
    Get full text
    Article
  3. 2683

    Maintaining the coverage of a satellite multibeam hybrid reflector antenna by monitoring the current reflector state using signals of on-ground beacon by A. V. Dardymov, Yu. I. Choni, A. G. Romanov, I. Yu. Danilov

    Published 2024-01-01
    “…In the paper, we propose an algorithm within the so-called best-fit paraboloid ideology, identify factors that can slow down its convergence, and evaluate the efficiency of electronic adaptation that can be achieved with it. …”
    Get full text
    Article
  4. 2684

    Dynamics and Chaos Intensity Analysis of Under-Actuated Mechanism by Uniformity and Particle Swarm Optimization by Hui Li, Yang Shu, Yongping Gu, Wuye Xiang, Feng Zhang

    Published 2024-11-01
    “…To solve this problem, uniformity is used to evaluate the chaos intensity of the system. Finally, based on uniformity, the particle swarm optimization algorithm successfully achieves the suppression and enhancement of the chaos intensity of the closed-chain under-actuated five-bar mechanism by optimizing its linkage length and driving speed, and the results are verified by the experimental platform.…”
    Get full text
    Article
  5. 2685

    Dynamics Modeling and Control of a Quadrotor with Swing Load by S. Sadr, S. Ali A. Moosavian, P. Zarafshan

    Published 2014-01-01
    “…So, the purpose of this research is proposing and designing an antiswing control algorithm for the suspended load. To this end, control and stabilization of the quadrotor are necessary for designing the antiswing controller. …”
    Get full text
    Article
  6. 2686

    Enhancing maize streak virus detection: a comparative analysis of Sentinel-2 MSI and Landsat 9 OLI data across vegetative and reproductive growth stages by Thabiso Jack Choshi, Inos Dhau, Frederick Mashao

    Published 2025-12-01
    “…Maize streak virus (MSV) threatens food production in Africa and globally. This study evaluates the effectiveness of Sentinel-2 MSI and Landsat 9 in detecting MSV-infected maize at different growth stages in Ofcolaco farms, Tzaneen, South Africa, using the Random Forest algorithm in Google Earth Engine. …”
    Get full text
    Article
  7. 2687

    Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning by Wafaa Al-Kahla, Eyad Taqieddin, Ahmed S. Shatnawi, Rami Al-Ouran

    Published 2024-01-01
    “…These vectors are then used to train different Machine Learning algorithms for detecting and classifying malware. …”
    Get full text
    Article
  8. 2688

    An Enhanced Adaptive Kalman Filter for Multibody Model Observation by Antonio J. Rodríguez, Emilio Sanjurjo, Miguel Ángel Naya

    Published 2025-04-01
    “…One of the most tricky questions with the different approaches tested in the literature is the parameter tuning of the filters, in particular, the covariance matrix of the plant noise. …”
    Get full text
    Article
  9. 2689

    Persistent Homology Combined with Machine Learning for Social Network Activity Analysis by Zhijian Zhang, Yuqing Sun, Yayun Liu, Lin Jiang, Zhengmi Li

    Published 2024-12-01
    “…The results show that the proposed algorithm can effectively classify social network users into different groups, which provides a good foundation for further research and application.…”
    Get full text
    Article
  10. 2690

    Exploring machine learning classification for community based health insurance enrollment in Ethiopia by Seyifemickael Amare Yilema, Seyifemickael Amare Yilema, Yegnanew A. Shiferaw, Yikeber Abebaw Moyehodie, Setegn Muche Fenta, Denekew Bitew Belay, Denekew Bitew Belay, Haile Mekonnen Fenta, Haile Mekonnen Fenta, Teshager Zerihun Nigussie, Ding-Geng Chen, Ding-Geng Chen

    Published 2025-07-01
    “…Receiver operating characteristic curves and other metrics were used to evaluate each model’s accuracy.ResultsThe RF algorithm was determined to be the best machine learning model based on different performance assessments. …”
    Get full text
    Article
  11. 2691

    ClothGAN: generation of fashionable Dunhuang clothes using generative adversarial networks by Qiang Wu, Baixue Zhu, Binbin Yong, Yongqiang Wei, Xuetao Jiang, Rui Zhou, Qingguo Zhou

    Published 2021-04-01
    “…We evaluated these clothing works generated from different models by computing inception score (IS), human prefer score (HPS) and generated score (IS and HPS). …”
    Get full text
    Article
  12. 2692

    An Intelligent System for Light and Air Conditioner Control Using YOLOv8 by Ikharochman Tri Utomo, Muhammad Nauval Firdaus, Sisdarmanto Adinandra, Suatmi Murnani

    Published 2024-12-01
    “…This study aims to develop and evaluate a system that employs a camera integrated with the YOLOv8 algorithm to detect human presence and optimize energy usage by controlling lights and air conditioning. …”
    Get full text
    Article
  13. 2693

    A WiFi RSSI ranking fingerprint positioning system and its application to indoor activities of daily living recognition by Zixiang Ma, Bang Wu, Stefan Poslad

    Published 2019-04-01
    “…First, an access point selection based on a genetic algorithm is applied to reduce the positioning computational cost and increase the positioning accuracy. …”
    Get full text
    Article
  14. 2694

    Defect detection based on extreme edge of defective region histogram by Zouhir Wakaf, Hamid A. Jalab

    Published 2018-01-01
    “…To evaluate the proposed defect-detection method, common standard images for experimentation were used. …”
    Get full text
    Article
  15. 2695

    An efficient supervised framework for music mood recognition using autoencoder‐based optimised support vector regression model by Gaurav Agarwal, Hari Om

    Published 2021-04-01
    “…Using the K‐Medoid‐based brain storm algorithm, the optimal parameters of the SVR are selected. …”
    Get full text
    Article
  16. 2696

    Web application firewall based on machine learning models by Muhammed Ersin Durmuşkaya, Selim Bayraklı

    Published 2025-07-01
    “…A hybrid dataset, including CISC 2010, HTTPParams 2015, and real-time Hypertext Transfer Protocol (HTTP) requests, was employed. The study evaluated five classification algorithms—K-nearest neighbors, logistic regression, naïve Bayes, support vector machine, and decision tree—for detecting cross site scripting (XSS), Structured Query Language (SQL) Injection, Operating System Command Injection, and Local File Inclusion attacks. …”
    Get full text
    Article
  17. 2697

    Dynamic Capacitated Arc Routing Problem in E-Bike Sharing System: A Monte Carlo Tree Search Approach by Shiqi Tan, Zhiheng Li, Na Xie

    Published 2021-01-01
    “…A Monte Carlo Tree Search algorithm is also used to improve the simulation efficiency. …”
    Get full text
    Article
  18. 2698

    New experimental techniques for fracture testing of highly deformable materials by E. Dall’Asta, V. Ghizzardi, R. Brighenti, E. Romeo, R. Roncella, A. Spagnoli

    Published 2015-12-01
    “…Thanks to the implemented algorithm based on a Semi-Global Matching (SGM) approach, it is possible to constraint the regularity of the displacement field in order to significantly improve the reliability of the evaluated strains, especially in highly deformable materials. …”
    Get full text
    Article
  19. 2699

    ProvNavigator: shadow path guided attack investigation method by XI Hao, FAN Hao, YUAN Shenyang, ZHU Jinyu, CHEN Changhua, WAN Hai, ZHAO Xibin

    Published 2025-04-01
    “…A prototype system was developed and was experimentally evaluated in 6 real attack scenarios, including 4 DARPA TC datasets. …”
    Get full text
    Article
  20. 2700

    An Empirical Taxonomy of Video Summarization Model From a Statistical Perspective by Sai Babu Veesam, Aravapalli Rama Satish

    Published 2024-01-01
    “…This paper has thrown out a comprehensive taxonomic view of all different video summarization techniques that show variously adopted methodologies efficiently condensing large video data. …”
    Get full text
    Article