Showing 2,861 - 2,880 results of 4,558 for search 'different evaluation algorithm', query time: 0.17s Refine Results
  1. 2861

    2D Animal Skeletons Keypoint Detection: Research Progress and Future Trends by Pengfei Ma, Ronghua Gao, Qifeng Li, Qinyang Yu, Rong Wang, Chengrong Lai, Weiwei Huang, Peng Hao, Zhaoyang Wang, Xuwen Li

    Published 2025-01-01
    “…The paper not only summarizes different model algorithms, datasets, and evaluation metrics related to animal keypoint detection but also integrates various application scenarios, highlighting distinct features under different focal points. …”
    Get full text
    Article
  2. 2862

    Analysis of Electron Distribution Functions From the Magnetospheric Multiscale (MMS) Mission Using the Gaussian Mixture Model by Beniamino Sanò, Nathan N. Maes Anno, David L. Newman, Marty Goldman, Francesco Valentini, Denise Perrone, Giovanni Lapenta

    Published 2025-03-01
    “…By varying the inter‐beam average difference and the beam standard deviation we evaluate the ability of the GMM in recognizing correctly the beam. …”
    Get full text
    Article
  3. 2863

    Neuropathic pain: proposal of a mechanism-based treatment by Laura Demartini, Cesare Bonezzi

    Published 2025-04-01
    “…Some authors have suggested that the poor results in the treatment of neuropathic pain may be related to the different mechanisms present in each patient and have tried to correlate them with clinical characteristics in order to evaluate possible targeted treatments. …”
    Get full text
    Article
  4. 2864

    IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS by Nataliia Lada, Yuliia Rudnytska

    Published 2022-06-01
    “…Synthesis of symmetric cryptographic coding operations belonging to different mathematical groups provides increase of algorithm's crypto stability. …”
    Get full text
    Article
  5. 2865

    Dynamic Adaptive Parametric Social Network Analysis Using Reinforcement Learning: A Case Study in Topic-Aware Influence Maximization by Mohammad Hossein Ahmadikia, Mehdy Roayaei

    Published 2025-01-01
    “…Current network analysis algorithms often rely on search methods or centrality measures but face challenges such as 1) The solution space is large, resulting in high computational complexity. 2) Algorithms may be instance-dependent, relying considerably on network structure and characteristics, which may result in varying performance across different networks. 3) Most existing centrality measures are inherently static, which fail to capture the dynamic nature inherent in network analysis problems. …”
    Get full text
    Article
  6. 2866

    Urban pulse: measuring pace of life through public camera-based cadence analysis by Pei-Yu Ho, Ming-Kuang Chung, Ling-Jyh Chen

    Published 2025-08-01
    “…This approach has been applied using various live public cameras to evaluate pedestrian cadence, examining differences between diverse geographical and functional zones (residential, educational, touristic, business, and traffic areas). …”
    Get full text
    Article
  7. 2867

    Assessment of the effectiveness of scenarios for the adaptation of the regional economy to external economic constraints by A. V. Rezepin, I. V. Danilova, N. V. Pravdina

    Published 2025-01-01
    “…Purpose: is to evaluate the effectiveness of adaptation scenarios to the external economic constraints of the regional economy, taking into account changes in the structural characteristics of the industrial sector.Methods: to determine the "sufficient" and "necessary" conditions for effective adaptation of regions to foreign economic constraints, the study used qualitative comparative analysis using fuzzy sets (fsQCA) and the Quine-McCluskey algorithm. 27 combinations of qualitative characteristics of regional adaptation have been identified, taking into account changes in the sectoral structure of production, the degree of openness of the economy, the level of manufacturability and innovation of products. …”
    Get full text
    Article
  8. 2868

    Naive Bayes Analysis for Nutritional Fulfillment Prediction in Children by Satrio Agung Wicaksono, Satrio Hadi Wijoyo, Fatmawati Fatmawati, Tri Afirianto, Diva Kurnianingtyas, Mochammad Chandra Saputra

    Published 2025-06-01
    “…Six test scenarios were conducted using different percentages of training data (90%, 80%, 70%, 60%, 50%, and 40%) to evaluate the reliability of the Naïve Bayes method. …”
    Get full text
    Article
  9. 2869

    A Robust Adaptive Strategy for Diesel Particulate Filter Health Monitoring Using Soot Sensor Data by Bilal Youssef

    Published 2025-04-01
    “…Different cost functions have been tested and evaluated to improve the diagnostic performance. …”
    Get full text
    Article
  10. 2870

    Intelligent intrusion detection system based on crowd search optimization for attack classification in network security by Chetan Gupta, Amit Kumar, Neelesh Kumar Jain

    Published 2025-07-01
    “…We have also created a confusion matrix over different kinds of attacks concerning predicted class and attack class, enabling us to evaluate the performance of a classification model for various attack groups without taking CSO and after applying the CSO approach. …”
    Get full text
    Article
  11. 2871

    A Generic Millimeter Wave and Terahertz Spectrum Reuse Model for In-Building Multi-Band Small Cells: Achieving Spectral and Energy Efficiencies of 6G by Rony K. Saha

    Published 2025-01-01
    “…We formulate the spectral efficiency (SE) and energy efficiency (EE) metrics of the proposed GSRM in a multi-tier network and develop an algorithm to evaluate its SE and EE metrics. With extensive system-wide evaluations, we show that compared to scenario 1, the overall SE and EE in scenario 2 are improved by 33.33% and 4.5%, respectively, and the proposed GSRM can achieve the prospective SE and EE requirements for 6G mobile systems.…”
    Get full text
    Article
  12. 2872

    2CA-R<sup>2</sup>: A Hybrid MAC Protocol for Machine-Type Communications by Sergio Javier-Alvarez, Pablo Hernandez-Duran, Miguel Lopez-Guerrero, Luis Orozco-Barbosa

    Published 2025-05-01
    “…What distinguishes this proposal is that the contention stage is controlled by a conflict–resolution algorithm known as Adaptive-2C. The protocol was evaluated using a model based on a Markov chain and computer simulations. …”
    Get full text
    Article
  13. 2873

    Optimizing relay node selection in cooperative wireless body area networks with modified POA by A. Hena Rubavathy, S. Sundar

    Published 2024-12-01
    “…The proposed method is assessed in comparison with other relay selection techniques through a Bit Error Rate (BER) analysis, evaluating the effectiveness of each approach across different Signal-to-Noise Ratio (SNR) scenarios. …”
    Get full text
    Article
  14. 2874

    Facial Recognition Databases: Recent Developments and Review of Methods by Waleed Ayad, Siraj Qays, Asanka G. Perera, Ali Al-Naji

    Published 2023-12-01
    “…There is a fundamental relationship between the development of facial recognition algorithms and the possibility of the existence of databases of different faces that influence the appearance of the face in a constrained manner. …”
    Get full text
    Article
  15. 2875

    A novel class of fourth-order derivative-free iterative methods to obtain multiple zeros and their basins of attraction by Munish Kansal, Vanita Sharma, Litika Rani, Lorentz Jäntschi

    Published 2024-12-01
    “…This article proposed a novel fourth-order class based on weight functions to locate multiple roots numerically, which did not require the evaluation of derivatives at any stage of computation. …”
    Get full text
    Article
  16. 2876

    Design and Implementation of a Quantum-Assisted Digital Signature by Marta Irene García-Cid, Rodrigo Martín, David Domingo, Vicente Martín, Laura Ortiz

    Published 2025-01-01
    “…A comparative evaluation of the results obtained for Q-DS is carried out with 6 pre-quantum and 12 post-quantum digital signature algorithms. …”
    Get full text
    Article
  17. 2877

    Enhancing environmental models with a new downscaling method for global radiation in complex terrain by A. Druel, J. Ruffault, H. Davi, A. Chanzy, O. Marloie, M. De Cáceres, A. Olioso, F. Mouillot, C. François, K. Soudani, N. K. Martin-StPaul

    Published 2025-01-01
    “…The influences of surrounding mountains' shade on direct radiation and the “bowl” (deep valley) effect (or sky-view factor) on diffuse radiation are then considered. The model was evaluated by comparing simulated and observed radiation at the Mont Ventoux study site (southeast of France) using the recent ERA5-Land hourly data available at a 9 km resolution as input and downscaled to different spatial resolutions (from 1 km to 30 m resolution) using a DEM. …”
    Get full text
    Article
  18. 2878

    “Decision Tree” as a Tool for Analyzing the Psychodiagnostics Data Latent Connections by Elena V. Slavutskaya, Leonid A. Slavutsky

    Published 2025-06-01
    “…The study demonstrated the possibilities of the proposed data processing algorithm for evaluating the latent connections between psychological characteristics and for building the hierarchical structures corresponding to vertical system data analysis. …”
    Get full text
    Article
  19. 2879

    EXPERIENCE OF USING DIGITAL SYSTEMS FOR DIAGNOSTICS OF HYPERTROPHIC SKIN SCARS OF FACE by D.S. Avetikov, O.P. Bukhanchenko, I.O. Ivanytsky, N.A. Sokolova, I.V. Boyko

    Published 2018-06-01
    “…Currently, conventional algorithms for selecting methods of treating patients with scars are available. …”
    Get full text
    Article
  20. 2880

    Fiber-Optic Sensor Spectrum Noise Reduction Based on a Generative Adversarial Network by Yujie Lu, Qingbin Du, Ruijia Zhang, Bo Wang, Zigeng Liu, Qizhe Tang, Pan Dai, Xiangxiang Fan, Chun Huang

    Published 2024-11-01
    “…This study evaluates the denoising performance of simulated spectra obtained from four different types of fiber-optic sensors: fiber Fabry–Perot interferometer (FPI), regular fiber Bragg grating (FBG), chirped FBG, and FBG pair. …”
    Get full text
    Article