Showing 1,881 - 1,900 results of 4,558 for search 'different evaluation algorithm', query time: 0.11s Refine Results
  1. 1881

    Optimization Configuration Method of Energy Storage Considering Photovoltaic Power Consumption and Source-Load Uncertainty by Junjie Qiao, Xiaofang Meng, Weigang Zheng, Pengxue Huang, Tiefeng Xu, Yupeng Xu

    Published 2025-01-01
    “…Subsequently, the objective function, which seeks to minimize the total daily operating cost of the energy storage system and the PV abandonment rate, is constructed using the evaluation-based function method. The constraints, including node voltage and energy storage device, are considered, and the model is solved using the improved grey wolf optimization algorithm. …”
    Get full text
    Article
  2. 1882

    Low latency Montgomery multiplier for cryptographic applications by khalid javeed, Muhammad Huzaifa, Safiullah Khan, Atif Raza Jafri

    Published 2021-07-01
    “…PKC systems such as ECC and RSA is implemented for different security services such as key exchange between sender, receiver and key distribution between different network nodes and authentication protocols. …”
    Get full text
    Article
  3. 1883

    Evolving Camouflages: A User-Centric AI Approach for Game Aesthetics by Rasmus Ploug, Emil Rimer, Anthon Kristian Skov Petersen, Marco Scirea, Joseph Alexander Brown

    Published 2025-01-01
    “…This project investigates the use of an evolutionary algorithm for texture generation and allows users to choose and manipulate camouflage patterns. …”
    Get full text
    Article
  4. 1884

    Implementation and Applications of Intelligent Batch Processing Technology for Isotope Injection Profile Logging Interpretation by SUN Liang

    Published 2024-02-01
    “…Through integrated operation on the national major scientific and technological integration platform CIFLog, the single well processing time is reduced from 30~60minutes to 30 seconds, and the manual intervention rate is less than 12%, verifying the effectiveness of the processing process and algorithm.…”
    Get full text
    Article
  5. 1885

    Comparison between MDDV and VADD routing protocols in VANET (Case Study) by Ahmed Ghassan Hameed, Mahmoud Shuker Mahmoud

    Published 2024-04-01
    “… Routing is the process of delivering a packet from a source to a destination in the network using a routing algorithm that tries to create an efficient path. The path should be created with minimum overhead and bandwidth consumption. …”
    Get full text
    Article
  6. 1886

    A Survey of Localization in Wireless Sensor Network by Long Cheng, Chengdong Wu, Yunzhou Zhang, Hao Wu, Mengxin Li, Carsten Maple

    Published 2012-12-01
    “…In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network.…”
    Get full text
    Article
  7. 1887

    Retrospective Illumination Correction of Retinal Images by Libor Kubecka, Jiri Jan, Radim Kolar

    Published 2010-01-01
    “…This allows us to express the derivatives of the entropy criterion analytically, which enables efficient use of gradient-based optimization algorithms. Seven different gradient- and nongradient-based optimization algorithms were initially tested on a set of 40 simulated retinal images, generated by a model of the respective image acquisition system. …”
    Get full text
    Article
  8. 1888

    An Improved Machine Learning-Based Method for Unsupervised Characterisation for Coral Reef Monitoring in Earth Observation Time-Series Data by Zayad AlZayer, Philippa Mason, Robert Platt, Cédric M. John

    Published 2025-04-01
    “…The workflow incorporates depth correction using Lyzenga’s algorithm and superpixel analysis, culminating in an unsupervised classification of reef areas using KMeans. …”
    Get full text
    Article
  9. 1889

    A METHOD FOR INVESTIGATING MACHINE LEARNING ATTACKS ON ARBITER-TYPE PHYSICALLY UNCLONABLE FUNCTIONS by Yuri A. Korotaev

    Published 2025-02-01
    “…A method is proposed to enhance the efficiency of attacks on APUFs by preliminarily selecting an appropriate machine learning algorithm using PUF models. This approach allows for a preliminary evaluation of the effectiveness of different algorithms for attacking APUFs without access to challenge-response datasets from real instances of physically unclonable functions. …”
    Get full text
    Article
  10. 1890

    A metaheuristic to support the distribution of COVID-19 vaccines by Augusto José da Silva Rodrigues, Gabriel Lopes Lima

    Published 2021-10-01
    “…Effective analysis was obtained in the evaluation of the proposed algorithm, both in terms of computational effort and the quality of the final solution. …”
    Get full text
    Article
  11. 1891

    Multi-objective clustering: a kernel based approach using Differential Evolution by Subrat Kumar Nayak, Pravat Kumar Rout, Alok Kumar Jagadev

    Published 2019-07-01
    “…A multi-objective algorithm is always favoured over a single objective algorithm as it considers different aspects of a dataset in the form of various objectives. …”
    Get full text
    Article
  12. 1892

    Cross-validation of methods for the quantitative determination of phenazepam and its active metabolite in human blood plasma at various extractions by A. I. Platova, I. I. Kuzmin, D. V. Ivaschenko, I. I. Miroshnichenko

    Published 2024-11-01
    “…The statistical approaches used in the work have confirmed the reproducibility of the results of different sample preparation methods. In addition to cross-validation, the statistical algorithm from this paper using Bland – Altman analysis can be successfully employed to assess accuracy and precision during bioanalytical method validation and evaluation of the acceptance of analytical runs, as well as to determine the level of reproducibility of incurred samples.…”
    Get full text
    Article
  13. 1893

    SNet: A novel convolutional neural network architecture for advanced endoscopic image classification of gastrointestinal disorders by Samra Siddiqui, Junaid A. Khan, Tallha Akram, Meshal Alharbi, Jaehyuk Cha, Dina A. AlHammadi

    Published 2025-08-01
    “…The proposed convolutional neural network (CNN) model is comprised of six blocks placed at different layers. To enable the exhaustive evaluation of proposed framework across different datasets, the model has undergone training on a very complex HyperKvasir dataset, and later tested on Kvasir v1 and v2 datasets. …”
    Get full text
    Article
  14. 1894

    Multi-criteria vehicle routing problem for a real-life parcel locker-based delivery by Radosław Idzikowski, Jarosław Rudy, Michał Jaroszczuk

    Published 2025-07-01
    “…However, results also indicate that both Tabu Search and Genetic Algorithm have different effectiveness in different cases. …”
    Get full text
    Article
  15. 1895

    Integrating Time Series Anomaly Detection Into DevOps Workflows by Gustav Kanahols, Shahriar Hasan, Per Erik Strandberg

    Published 2025-01-01
    “…Moreover, to benchmark the dataset, we first label a subset of the dataset based on feedback from the DevOps experts within the industry context. Then six different algorithms are employed on the dataset and their performance in anomaly detection is evaluated using three different Area Under the Curve (AUC) metrics. …”
    Get full text
    Article
  16. 1896

    Data-driven prediction of cardiovascular and cerebrovascular diseases in a nationwide study by Sehyun Kim, Beomsang Ryu, Mingee Choi, Sangyon Lee, Jaeyong Shin, Sok Chul Hong

    Published 2025-07-01
    “…The logistic regression model incorporating variables selected by the LASSO algorithm exhibited superior predictive performance relative to other models, although the differences were not statistically significant. …”
    Get full text
    Article
  17. 1897

    Design, Mathematical Modeling, and Control of an Underactuated 3-DOF Experimental Helicopter by Osamah Talal Makki, Seyyed Sajjad Moosapour, Saleh Mobayen, Jafar Heyrani Nobari

    Published 2024-01-01
    “…The system is considered an essential benchmark for the development and evaluation of control algorithms and identification methods as it mimics real helicopters and UAVs. …”
    Get full text
    Article
  18. 1898

    Optimizing the core loading pattern and fuel composition in a hexagonal small modular nuclear reactor via ANN-PSO approach by G.R. Ansarifar, M.R. Karimi, H. Zayermohammadi Rishehri

    Published 2025-06-01
    “…Various models featuring hexagonal FAs, containing different mixed fuels, were tested through a series of simulations. …”
    Get full text
    Article
  19. 1899

    Research on the Reliability of Intelligent Dispatching Management System for Open-pit Mines by QIU Zixian, XU Yueyun, WANG Xiaowei, HU Manjiang, QIN Hongmao

    Published 2022-10-01
    “…At the same time, considering that different service instance deployment methods have a key impact on the reliability of the scheduling system, this paper proposes a step-by-step traversal algorithm to obtain the best service instance deployment method, and then obtain the most reliable scheduling system deployment method. …”
    Get full text
    Article
  20. 1900

    The ability to assess the state of the fundus in patients with lens opacities of varying intensity, including patients with type 2 diabetes mellitus, using quantitative analysis of... by L. A. Mineeva, L. I. Balashevich, A. A. Kozhukhov, L. B. Shubin, A. V. Kabanov, C. Passaglia, D. Richards, B. Madow

    Published 2020-05-01
    “…In order to better fix the details of the fundus images with lens opacities using a computer algorithm with a filter system, evaluation scales have been developed – the clarity score scale and the blur score scale. …”
    Get full text
    Article