Showing 281 - 300 results of 4,558 for search 'different evaluation algorithm', query time: 0.17s Refine Results
  1. 281
  2. 282

    Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms by Manar Kashmola, Bayda Khaleel

    Published 2012-12-01
    “…These such items are more similar to each other within cluster, and difference than they are in the other clusters. Three fuzzy clustering algorithms (Fuzzy C-Means, Possibilistic C-Means and Gustafson-Kessel algorithms) were applied using kdd cup 99 data set to classify this data set  into 23 classes according to the subtype of attacks. …”
    Get full text
    Article
  3. 283

    Water Quality Prediction Using Artificial Intelligence Algorithms by Theyazn H. H Aldhyani, Mohammed Al-Yaari, Hasan Alkahtani, Mashael Maashi

    Published 2020-01-01
    “…In this work, advanced artificial intelligence (AI) algorithms are developed to predict water quality index (WQI) and water quality classification (WQC). …”
    Get full text
    Article
  4. 284

    Time Series measurements of White Blood Cells (WBC) and plasma Cancer Antigen 15-3 (CA 15-3) in a patient with metastatic breast cancer, serving as a reference for assessing the cl... by Alexandros CLOUVAS

    Published 2024-12-01
    “…In a recent study, the significance of the K-means clustering algorithm was examined for the first time in evaluating time-series measurements of plasma Cancer Antigen 15-3 (CA 15-3) in a male patient with metastatic breast cancer. …”
    Get full text
    Article
  5. 285

    Cross-Domain Recommendation Algorithm Based on Latent Factor Model by Sheng Gao, Siting Ren, Jun Guo

    Published 2015-07-01
    “…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
    Get full text
    Article
  6. 286

    Vulnerability benchmark generation algorithm based on finite state machines by XIE Yuandong, YAN Xuexiong, ZHAO Guangsheng, ZHAO Xu, QIU Han

    Published 2025-06-01
    “…Experimental results demonstrate that the generated benchmarks more closely resemble the complexity of real software, effectively exposing biases and deficiencies in vulnerability detection tools across different code paths. This study validates the algorithm’s effectiveness and practical utility, confirming that it provides a more comprehensive and realistic benchmark for evaluating vulnerability detection tools.…”
    Get full text
    Article
  7. 287

    Application of the metaheuristic algorithms to quantify the GSI based on the RMR classification by Pouya Koureh Davoodi, Farnusch Hajizadeh, Mohammad Rezaei

    Published 2025-08-01
    “…According to this evaluation, the best-performing equation from each algorithm was selected as the optimum and further evaluated using both graphical and statistical analyses, including comparisons with conventional empirical relationships. …”
    Get full text
    Article
  8. 288

    Realization and discussion of selected artificial intelligence algorithms in computer games by Yurii Tyshchenko

    Published 2025-03-01
    “…The aim is to evaluate the efficiency and learning ability across different scenarios, such as Blackjack and Poker Limit Hold'em. …”
    Get full text
    Article
  9. 289

    Adapted Single Scale Retinex Algorithm for Nighttime Image Enhancement by Mohammad Ismail, Zohair Al-Ameen

    Published 2022-06-01
    “…Therefore, it is difficult to perceive, extract, and analyze important visual information from these images, unless they were properly processed. Different algorithms exist to process nighttime images, yet most of these algorithms are highly complex, generate processing artifacts, over-smooth the images, or do not improve the illumination adequately. …”
    Get full text
    Article
  10. 290

    A Reliable Application of MPC for Securing the Tri-Training Algorithm by Hendra Kurniawan, Masahiro Mambo

    Published 2023-01-01
    “…The simulation results show that tri-training in secure MPC has almost same accuracy compared to original tri-training algorithm. We also compare execution time in addition to performance evaluation of tri-training in secure and the original tri-training algorithms.…”
    Get full text
    Article
  11. 291

    Firefly Algorithm based Feature Selection for Arabic Text Classification by Souad Larabi Marie-Sainte, Nada Alalyani

    Published 2020-03-01
    “…This algorithm has been successfully applied in different combinatorial problems. …”
    Get full text
    Article
  12. 292

    Enhancing breast cancer diagnosis through machine learning algorithms by Javad Amraei, Aboulfazl Mirzapoor, Kiomars Motarjem, Mohammad Abdolahad

    Published 2025-07-01
    “…In this research has done extensive algorithm evaluation like SVM, DT, RF, Logistic regression, KNN and ANN using datasets CDP Breast Cancer. …”
    Get full text
    Article
  13. 293

    Human activity recognition algorithms for manual material handling activities by Andreas Sochopoulos, Tommaso Poliero, Jamil Ahmad, Darwin G. Caldwell, Christian Di Natali

    Published 2025-03-01
    “…HAR using IMUs can aid both the ergonomic evaluation of the performed activities and, more recently, with the development of exoskeleton technologies, can assist with the selection of precisely tailored assisting strategies. …”
    Get full text
    Article
  14. 294

    Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm by Youle Song, Yuting Duan, Tong Rao

    Published 2025-07-01
    “…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
    Get full text
    Article
  15. 295

    A lightweight 256 hexadecimal character substitution Cipher algorithm by Ibrahim Lawal, Musa Yusuf, Adamu Sulaiman Usman, Oluwasegun Ishaya Adelaiye

    Published 2025-07-01
    “…The aim of this study was achieved by the following objectives; a design of the HCSC algorithm, an implementation of the proposed HCSC algorithm using python programming language and the evaluation of its performance in comparison with existing study. …”
    Get full text
    Article
  16. 296

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
    Get full text
    Article
  17. 297

    SWR: Smartness Provided by Simple, Efficient, and Self-Adaptive Algorithm by Mujdat Soyturk, Deniz Turgay Altilar

    Published 2012-02-01
    “…In this paper, a novel routing algorithm, stateless weight routing (SWR), is proposed. …”
    Get full text
    Article
  18. 298

    RLS-Based Control Algorithms for 3D Zones of Quiet by Małgorzata I. MICHALCZYK, Janusz SERWIN

    Published 2008-12-01
    “…Finally, the efficiency of ANC systems using different control structures and RLS-based control algorithms is compared.…”
    Get full text
    Article
  19. 299

    Abnormal link detection algorithm based on semi-local structure by Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG

    Published 2022-02-01
    “…With the research in network science, real networks involved are becoming more and more extensive.Redundant error relationships in complex systems, or behaviors that occur deliberately for unusual purposes, such as wrong clicks on webpages, telecommunication network spying calls, have a significant impact on the analysis work based on network structure.As an important branch of graph anomaly detection, anomalous edge recognition in complex networks aims to identify abnormal edges in network structures caused by human fabrication or data collection errors.Existing methods mainly start from the perspective of structural similarity, and use the connected structure between nodes to evaluate the abnormal degree of edge connection, which easily leads to the decomposition of the network structure, and the detection accuracy is greatly affected by the network type.In response to this problem, a CNSCL algorithm was proposed, which calculated the node importance at the semi-local structure scale, analyzed different types of local structures, and quantified the contribution of edges to the overall network connectivity according to the semi-local centrality in different structures, and quantified the reliability of the edge connection by combining with the difference of node structure similarity.Since the connected edges need to be removed in the calculation process to measure the impact on the overall connectivity of the network, there was a problem that the importance of nodes needed to be repeatedly calculated.Therefore, in the calculation process, the proposed algorithm also designs a dynamic update method to reduce the computational complexity of the algorithm, so that it could be applied to large-scale networks.Compared with the existing methods on 7 real networks with different structural tightness, the experimental results show that the method has higher detection accuracy than the benchmark method under the AUC measure, and under the condition of network sparse or missing, It can still maintain a relatively stable recognition accuracy.…”
    Get full text
    Article
  20. 300

    Improved Image Compression Scheme Using Hybrid Encoding Algorithm by Yusra Ahmed Salih, Aree Ali Mohammed, Loay Edwar George

    Published 2019-10-01
    “…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
    Get full text
    Article