Showing 361 - 380 results of 4,558 for search 'different evaluation algorithm', query time: 0.21s Refine Results
  1. 361

    Statistical modeling based fast rate distortion estimation algorithm for HEVC by Xiang MENG, Haibing YIN, Xiaofeng HUANG

    Published 2021-01-01
    “…To reduce the coding computational complexity of the rate and distortion calculations in HEVC, a fast TU level rate model with higher accuracy was proposed.The contribution percentages of different syntax elements in entropy coding were evaluated, and syntax element-wise accurate rate models were individually developed to construct the whole TU level model.In addition, coefficient levels were weighted adaptively to distinguish the nonuniform contributions of different coefficients in terms of rate profiling.Moreover, position-wise parameter was defined to depict the distribution patterns for possible non-zero coefficients within one block.The final linear rate model was developed by fine-tuning the model parameters from great amounts of samples in a statistical way.Finally, the transform domain distortion model was also established to bypass unnecessary reconstruction process.Experimental results show that the proposed algorithm can achieve 49.76% complexity reduction with 1.74% BD-BR increase for RA configuration.…”
    Get full text
    Article
  2. 362

    Defect identification method for overhead transmission lines based on SIFT algorithm by Qiang Liu, Xi Zheng, Qiuhan Zhang, Hongjie Sun, Jun Yan

    Published 2025-12-01
    “…Traditional inspection techniques depend on manual evaluations, which are subjective and entail considerable safety hazards for workers. …”
    Get full text
    Article
  3. 363

    GENETIC ALGORITHM-PID CONTROLLER FOR MODEL ORDER REDUCTION PANTOGRAPHCATENARY SYSTEM by Nasir A. Al-Awad, Izz K. Abboud, Muaayed F. Al-Rawi

    Published 2021-06-01
    “…In addition, the contact force can also additionally differ and ought to end up null, which may additionally purpose the loss of contact. …”
    Get full text
    Article
  4. 364

    Trusted Web Service Discovery Based on a Swarm Intelligence Algorithm by Zhengwang Ye, Hehe Sheng, Haiyang Zou

    Published 2025-04-01
    “…To evaluate the effectiveness of the TSDA-ACS, this paper introduces the random walk search algorithm (RW), the classic max–min ant colony algorithm (MMAS), and a trustworthy service discovery based on a modified ant colony algorithm (TSDMACS) for comparison with the TSDA-ACS algorithm. …”
    Get full text
    Article
  5. 365

    A Heuristic Algorithm for Optimal Service Composition in Complex Manufacturing Networks by Yinan Wu, Gongzhuang Peng, Hongwei Wang, Heming Zhang

    Published 2019-01-01
    “…The proposed algorithm is evaluated through a set of computational experiments in which the proposed algorithm and other popular algorithms such as MFPB_HOSTP are applied to the same dataset, and the results obtained show that DHA_OSCP can efficiently find the optimal service composition path with better Quality of Service (QoS). …”
    Get full text
    Article
  6. 366

    Comparative Analysis of YOLO-Based Algorithms for Vehicle Detection in Aerial Imagery by A. Dustali, M. Hasanlou, S. M. Azimi

    Published 2025-07-01
    “…Real-time object detection has become an essential tool in applications such as traffic surveillance, autonomous vehicles, and industrial monitoring. Among various algorithms, the You Only Look Once (YOLO) series has garnered significant attention for its balance between speed and accuracy. …”
    Get full text
    Article
  7. 367

    RETRACTED: Comparative analysis of compression algorithms for four-dimensional light fields by R. G. Bolbakov, V. A. Mordvinov, A. D. Makarevich

    Published 2022-07-01
    “…The selected evaluation criterion is affected not only by the dimension of the compression algorithm, but also by the distance of the baseline of the capture setting, since the difference between images increases with the distance between the optical centers of each camera matrix. …”
    Get full text
    Article
  8. 368

    Adaptive image encryption approach using an enhanced swarm intelligence algorithm by Sachin Minocha, Suvita Rani Sharma, Birmohan Singh, Amir H. Gandomi

    Published 2025-03-01
    “…The performance of the proposed encryption approach is evaluated on grayscale, RGB, and hyperspectral medical images of different modalities, bit depth, and sizes. …”
    Get full text
    Article
  9. 369

    Cross-validation for training and testing co-occurrence network inference algorithms by Daniel Agyapong, Jeffrey Ryan Propster, Jane Marks, Toby Dylan Hocking

    Published 2025-03-01
    “…We propose a novel cross-validation method to evaluate co-occurrence network inference algorithms, and new methods for applying existing algorithms to predict on test data. …”
    Get full text
    Article
  10. 370

    Detection algorithm of electronic disguised voice based on convolutional neural network by Hongwei XU, Diqun YAN, Fan YANG, Rangding WANG, Chao JIN, Li XIANG

    Published 2018-02-01
    “…An electronic disguised voice detection algorithm based on the statistical features of MFCC and the convolution neural network was proposed.Firstly,the statistical features of MFCC were extracted and reconstructed as the input of convolution neural network.Considering the convolution kernel size,the number of convolution kernels and the pooling size,24 different network structures were evaluated in this work.Finally,the convolution neural network structure which could be effectively used for electronic disguised voice detection was determined.The experimental results show that the proposed algorithm can effectively detect the trace of electronic disguising.Meanwhile,the specific forgery operation of the electronic disguised voice can also be estimated.…”
    Get full text
    Article
  11. 371

    Dimensionality Reduction Algorithms in Machine Learning: A Theoretical and Experimental Comparison by Ashish Kumar Rastogi, Swapnesh Taterh, Billakurthi Suresh Kumar

    Published 2023-12-01
    “…First, we discuss the theoretical foundation of a variety of FEAs from various categories like supervised vs. unsupervised, linear vs. nonlinear and random-projection-based vs. manifold-based, show their algorithms and compare these methods conceptually. Second, we determine the finest sets of new features for various datasets, as well as in terms of statistical significance, evaluate the eminence of the different types of transformed feature spaces and power analysis, and also determine the FEA efficacy in terms of speed and classification accuracy.…”
    Get full text
    Article
  12. 372

    A Closer Look at Invalid Action Masking in Policy Gradient Algorithms by Shengyi Huang, Santiago Ontañón

    Published 2022-05-01
    “…In this paper, we 1) show theoretical justification for such a practice, 2) empirically demonstrate its importance as the space of invalid actions grows, and 3) provide further insights by evaluating different action masking regimes, such as removing masking after an agent has been trained using masking.…”
    Get full text
    Article
  13. 373

    Sensitivity Analysis of a CPAM Inverse Algorithm for Composite Laminates Characterization by Farshid Masoumi, Ahmad Ghasemi Ghalebahman

    Published 2017-01-01
    “…The material characterization is first examined for isotropic plates under different boundary conditions to evaluate the method’s accuracy. …”
    Get full text
    Article
  14. 374

    Gaussian pulse shaping algorithm based on finite impulse response filters by HUANG Haixi, HONG Xu, LIU Junlong, SONG Xinru, LI Lin, ZHOU Chengzhuo

    Published 2024-12-01
    “…When performing Gaussian pulse shaping, errors introduced by hardware limitations may lead to differences in shaping results. Compared to infinite impulse response (IIR) filters, finite impulse response (FIR) filters have the advantage of being less affected by errors and more stable.PurposeThis study aims to propose a FIR filter-based Gaussian pulse shaping algorithm using impulse response functions, and realize a FPGA-based hardware implementation of this algorithm to evaluate the impact of hardware limitations on it.MethodsFirst of all, the discrete impulse response of Gaussian pulse shaping (GPS) was derived by means of impulse response invariant transformation, and shaped pulse waveforms under different quantization accuracies and truncation intervals were obtained using a computer simulation, so did that under Gaussian pulse shaping with or without additional truncation were assessed. …”
    Get full text
    Article
  15. 375

    A Scoring Algorithm for the Early Prediction of Academic Risk in STEM Courses by Vanja Čotić Poturić, Sanja Čandrlić, Ivan Dražić

    Published 2025-03-01
    “…The resulting scoring algorithm is distinguished by its methodological simplicity, ease of implementation, and adaptability to different educational settings, making it a practical tool for timely interventions.…”
    Get full text
    Article
  16. 376

    Optimal tuning of multi-PID controller using improved CMOCSO algorithm by Ying Hu, Xiongyan Liu, Hao Chen

    Published 2024-11-01
    “…The efficacy of the algorithm is evaluated through testing on 16 standard functions, demonstrating its effectiveness in addressing constrained multi-objective problems. …”
    Get full text
    Article
  17. 377

    An Improved Hybrid Genetic Algorithm with a New Local Search Procedure by Wen Wan, Jeffrey B. Birch

    Published 2013-01-01
    “…One important challenge of a hybrid genetic algorithm (HGA) (also called memetic algorithm) is the tradeoff between global and local searching (LS) as it is the case that the cost of an LS can be rather high. …”
    Get full text
    Article
  18. 378

    A Cluster-Based Consensus Algorithm in a Wireless Sensor Network by Yanwei Li, Zhenyu Zhou, Takuro Sato

    Published 2013-03-01
    “…With different DOI values, our ACDC gossip algorithm can still reach lower relative error compared with other gossip algorithms, which demonstrates that our algorithm is robust enough to be executed in the network.…”
    Get full text
    Article
  19. 379

    Religious Digital Creatives in Türkiye: A Research on the Axis of Algorithmic Authority by Yunus Ergen

    Published 2024-12-01
    “…This study aims to reveal who createsreligious digital content in Türkiye, to classify the structure of the content created, and to evaluate the level ofauthority of these creators in the focus of algorithmic authority. …”
    Get full text
    Article
  20. 380

    Advancement of the DRPE Encryption Algorithm for Phase CGHs by Random Pixel Shuffling by Alfonso Blesa, Francisco J. Serón

    Published 2025-04-01
    “…The similarity between different encryption levels is measured by the Pearson Coefficient to evaluate the results obtained.…”
    Get full text
    Article