Showing 401 - 420 results of 4,558 for search 'different evaluation algorithm', query time: 0.23s Refine Results
  1. 401

    Mitigating Algorithmic Bias in AI-Driven Cardiovascular Imaging for Fairer Diagnostics by Md Abu Sufian, Lujain Alsadder, Wahiba Hamzi, Sadia Zaman, A. S. M. Sharifuzzaman Sagar, Boumediene Hamzi

    Published 2024-11-01
    “…The robustness of the SCIR model was further demonstrated in the fairness evaluation metrics, which included demographic parity, equal opportunity difference (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.037</mn></mrow></semantics></math></inline-formula>), equalised odds difference (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.026</mn></mrow></semantics></math></inline-formula>), disparate impact (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>1.081</mn></mrow></semantics></math></inline-formula>), and Theil Index (<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>0.249</mn></mrow></semantics></math></inline-formula>). …”
    Get full text
    Article
  2. 402

    A Vessel Positioning Algorithm Based on Satellite Automatic Identification System by Shexiang Ma, Jie Wang, Xin Meng, Junfeng Wang

    Published 2017-01-01
    “…In the proposed method, the positioning model is a modification on the basis of time difference and frequency difference of arrival measurements by introducing an additional measurement, and the measurement is obtained through the interactive multiple model algorithm. …”
    Get full text
    Article
  3. 403

    Optimization based machine learning algorithms for software reliability growth models by Myeongguen Shin, Juwon Jung, Jihyun Lee, Insoo Ryu, Sanggun Park

    Published 2025-05-01
    “…To fill this gap, current study employs a broader range of optimization algorithms based on the Least Squares Method (LSM) and Maximum Likelihood Estimation (MLE) to approximate global optima. …”
    Get full text
    Article
  4. 404

    Prioritized Experience Replay–Based Path Planning Algorithm for Multiple UAVs by Chongde Ren, Jinchao Chen, Chenglie Du

    Published 2024-01-01
    “…First, we adopt a PER mechanism based on temporal difference (TD) error to enhance the efficiency of experience utilization and accelerate the convergence speed of the algorithm. …”
    Get full text
    Article
  5. 405

    Inverse versus convolution treatment planning algorithms for gamma knife radiosurgery by Marwa Ghanim, Siham Abdullah, Moneer Faraj, Nabaa Alazawy

    Published 2024-09-01
    “…There was significant difference between the two algorithm plans for all dosimetric parameters, with the inverse plan providing higher coverage and selectivity than convolution plan, but taking longer time(p<0.05), while plan was inverse plan better than convolution plan in terms of gradient and conformity (p<0.05). …”
    Get full text
    Article
  6. 406

    DROVE: An Algorithm for Spatial and Temporal Disaggregation of On-road Vehicle Emission Inventories by Carlos M. González, Carlos D. Gómez, Beatriz H. Aristizábal

    Published 2020-08-01
    “…In this study, we present a new computational algorithm named DROVE, for the disaggregation of on-road vehicle emissions in space and time. …”
    Get full text
    Article
  7. 407
  8. 408

    Getting the Best Out of Both Worlds: Algorithms for Hierarchical Inference at the Edge by Vishnu Narayanan Moothedath, Jaya Prakash Champati, James Gross

    Published 2024-01-01
    “…We evaluate and benchmark the performance of the proposed algorithms for image classification application using four datasets, namely, Imagenette and Imagewoof, MNIST, and CIFAR-10.…”
    Get full text
    Article
  9. 409

    A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms by Mustafa I. Salman et al.

    Published 2020-03-01
    “…First, we evaluate the video transmission over the SDN with ‎Bellman Ford algorithm. …”
    Get full text
    Article
  10. 410

    Presenting and Solving a Three-layer Supply Chain Model to Maximize Quality and Minimize the Estimated Delivery Time by Elham Nazemi, Mahdi Yousefi Nejad Attari, Mahdi Ghaffari

    Published 2022-09-01
    “…After presenting the model, it is solved by applying deterministic algorithms using GAMS software, and also NSGAII and MOIWO non-deterministic meta-heuristic algorithms using proper software. …”
    Get full text
    Article
  11. 411

    CLINICAL MANIFESTATIONS OF TRAUMATIC INTRACRANIAL HEMATOMAS WITH DIFFERENT OUTCOMES by G. V. Anisimov, Y. I. Kravtsov

    Published 2014-07-01
    “…Aim – clarification of the clinical progression nature of traumatic intracranial hematoma.Materials and methods. A comparative evaluation of neurological status, vegetative tone, level of stress (SL), and consciousness in 42 menwith different outcomes on neuroreanimation stage.Results. …”
    Get full text
    Article
  12. 412

    A Recommendation Algorithm Incorporating Adaptive Gating Mechanisms and Knowledge Graph Enhancements by Yi Yu, Teng Lv

    Published 2025-01-01
    “…Aiming at the problem that existing knowledge graph-based recommendation algorithms do not fully utilize the interaction information between users and items, this paper proposes a recommendation algorithm called Gated Adaptive and Knowledge-Enhanced Recommendation (GAKR) that integrates an adaptive gating mechanism with knowledge graph enhancement. …”
    Get full text
    Article
  13. 413

    Problems of Algorithms Development to Determine Quality of Topic Models Ensembles for Make Rubricators by A. P. Shiryaev, A. R. Fedorov, P. A. Fedorov, L. G. Gagarina, E. M. Portnov

    Published 2018-09-01
    “…This article describes the usage of a voting algorithm, which is based on a group of different evaluation algorithms. …”
    Get full text
    Article
  14. 414

    Parameters Identification for Photovoltaic Module Based on an Improved Artificial Fish Swarm Algorithm by Wei Han, Hong-Hua Wang, Ling Chen

    Published 2014-01-01
    “…In addition to the regular operation, a mutation operator (MO) is designed to enhance the searching performance of the algorithm. The feasibility of the proposed method is demonstrated by various parameters of PV module under different environmental conditions, and the testing results are compared with other studied methods in terms of final solutions and computational time. …”
    Get full text
    Article
  15. 415

    Robust Corner Detection Using Local Extrema Differences by Reza Yazdi, Hassan Khotanlou, Hosna Khademfar

    Published 2024-01-01
    “…Our approach leverages a unique corner response function derived from intensity sorting and difference calculations. We conduct a comprehensive evaluation comparing our detector to seven established algorithms using five benchmark images with ground truth corner locations. …”
    Get full text
    Article
  16. 416
  17. 417

    Random Walk‐Based GOOSE Algorithm for Solving Engineering Structural Design Problems by Sripathi Mounika, Himanshu Sharma, Aradhala Bala Krishna, Krishan Arora, Syed Immamul Ansarullah, Ayodeji Olalekan Salau

    Published 2025-05-01
    “…These benchmarks provide a diverse range of optimization landscapes, enabling comprehensive evaluation of IGOOSE algorithm performance under different problem complexities. …”
    Get full text
    Article
  18. 418

    Numerical approximation for algorithmic tangent moduli for nonlinear viscoelastic model with CSDA method by Xinggui Fan, Jinsheng Xu, Xiong Chen

    Published 2024-08-01
    “…After that, the idea of the CSDA is put to use in order to carry out a numerical evaluation of the algorithmic tangent moduli of a viscoelastic constitutive model. …”
    Get full text
    Article
  19. 419

    Auto forensic detecting algorithms of malicious code fragment based on TensorFlow by Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG

    Published 2021-08-01
    “…In order to auto detect the underlying malicious code fragments in complex,heterogeneous and massive evidence data about digital forensic investigation, a framework for malicious code fragment detecting algorithm based on TensorFlow was proposed by analyzing TensorFlow model and its characteristics.Back-propagation training algorithm was designed through the training progress of deep learning.The underlying binary feature pre-processing algorithm of malicious code fragment was discussed and proposed to address the problem about different devices and heterogeneous evidence sources from storage media and such as AFF forensic containers.An algorithm which used to generate data set about code fragments was designed and implemented.The experimental results show that the comprehensive evaluation index F<sub>1</sub>of the method can reach 0.922, and compared with CloudStrike, Comodo, FireEye antivirus engines, the algorithm has obvious advantage in dealing with the underlying code fragment data from heterogeneous storage media.…”
    Get full text
    Article
  20. 420

    Motion Planning and Tracking Control of Autonomous Vehicle Based on Improved A∗ Algorithm by Yunlong Bai, Gang Li, Ning Li

    Published 2022-01-01
    “…The resultant force generated by each potential field is further introduced into the evaluation function of A∗ algorithm to plan the driving path, which could be suitable for autonomous vehicles. …”
    Get full text
    Article