Search alternatives:
improve model » improved model (Expand Search)
Showing 6,421 - 6,440 results of 7,145 for search 'improve model optimization algorithm', query time: 0.25s Refine Results
  1. 6421

    Uncertainty evaluation of surface profile measurement error based on adaptive sparse grid polynomial chaos expansion by Ke Zhang, Xinya Zheng, Ruiyu Zhang

    Published 2025-06-01
    “…First, the surface profile error of the car door outer surface is initially evaluated using a NURBS surface fitting and segmentation approximation algorithm. Next, based on the error evaluation results, a polynomial chaos expansion model for the surface profile error is established. …”
    Get full text
    Article
  2. 6422

    Design and Prototype Verification of a 3-meter Aperture Wrap-rib Reflector by ZHANG Han, YAN Zhongxi, XIANG Ping, WU Minger

    Published 2025-01-01
    “…The shape of the lenticular tube wrap-rib was optimized by combining the form-finding analysis of the flexible reflector with the genetic algorithm. …”
    Get full text
    Article
  3. 6423

    Tactical intent-driven autonomous air combat behavior generation method by Xingyu Wang, Zhen Yang, Shiyuan Chai, Jichuan Huang, Yupeng He, Deyun Zhou

    Published 2024-12-01
    “…Built around this, the decision-making process of pilot behavior is analyzed, and a reward mapping model from intent to behavior is established. Finally, to address the problems of poor stability and slow convergence speed of deep reinforcement learning algorithms in large-scale state-action spaces, the dueling-noisy-multi-step DQN algorithm is devised, which not only improves the accuracy of value function approximation but also enhances the efficiency of space exploration and network generalization. …”
    Get full text
    Article
  4. 6424

    Preliminary analysis of acoustic detection of the Red-throated Caracara in northern Costa Rica by Roberto Vargas-Masís, Diego Quesada

    Published 2024-09-01
    “…Advances in automatic acoustic detection have transformed bird ecology, allowing researchers to analyze bird populations using pattern matching algorithms, machine learning, and random forest models. …”
    Get full text
    Article
  5. 6425

    Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector by Germán Rodríguez-Galán, Eduardo Benavides-Astudillo, Daniel Nuñez-Agurto, Pablo Puente-Ponce, Sonia Cárdenas-Delgado, Mauricio Loachamín-Valencia

    Published 2025-06-01
    “…Additionally, clustering algorithms enabled user segmentation based on cookie data, identification of behavioral patterns, enhanced personalized web recommendations, and browsing experience optimization. …”
    Get full text
    Article
  6. 6426

    Application of Adaptive Search Window-Based Nonlocal Total Variation Filter in Low-Dose Computed Tomography Images: A Phantom Study by Hajin Kim, Bo Kyung Cha, Kyuseok Kim, Youngjin Lee

    Published 2024-11-01
    “…Computed tomography (CT) imaging using low-dose radiation effectively reduces radiation exposure; however, it introduces noise amplification in the resulting image. This study models an adaptive nonlocal total variation (NL-TV) algorithm that efficiently reduces noise in X-ray-based images and applies it to low-dose CT images. …”
    Get full text
    Article
  7. 6427

    Numerical analysis method of stress wave transmission attenuation of coal and rock structural plane by Wenlong SHEN, Renren ZHU, Ziqiang CHEN, Guocang SHI

    Published 2024-11-01
    “…The simulation and machine learning of stress wave transmission in the experimental process of Split Hopkinson Pressure Bar (SHPB) were carried out by combining the Barton-Bandis nodal ontology model, UDEC discrete element simulation and Gray Wolf Algorithm optimized BP neural network technology. …”
    Get full text
    Article
  8. 6428

    Arrears behavior prediction of power users based on BP neural network and multi-scale feature learning: a refined risk assessment framework by Liang Yu, Yuanshen Hong, Hua Lin, Xu Jiang, Ziming Song

    Published 2025-01-01
    “…A hierarchical neural network structure is designed to address the characteristics of different scales in distinct layers. Key model parameters are optimized, and a sensitivity analysis is conducted. …”
    Get full text
    Article
  9. 6429

    SwinFishNet: A Swin Transformer-based approach for automatic fish species classification using transfer learning. by Ebru Ergün

    Published 2025-01-01
    “…Images were preprocessed by resizing to 224 [Formula: see text] 224 pixels, normalizing, and converting to tensor format for compatibility with deep learning models. Transfer learning was applied using the ST, which was fine-tuned on these datasets and optimized with the AdamW algorithm. …”
    Get full text
    Article
  10. 6430

    Degree-Constrained k-Minimum Spanning Tree Problem by Pablo Adasme, Ali Dehghan Firoozabadi

    Published 2020-01-01
    “…Our numerical results indicate that the proposed models and algorithms allow obtaining optimal and near-optimal solutions, respectively. …”
    Get full text
    Article
  11. 6431

    Belief in building a full-fledged distance learning course in athletic training by Andrii Yefremenko, Illia Shutieiev

    Published 2025-06-01
    “…In particular, the experts mostly agreed with the logic and completeness of the course structure, the expediency of centralised content placement in the cloud environment, the optimality of the selected communication channels (email and cloud services), the clarity of the motor learning algorithm for remote performance by students, the adequacy of the proposed evaluation system and the presence of significant advantages in the use of tablets/smartphones in the educational process. …”
    Get full text
    Article
  12. 6432

    Enhanced Vector Quantization for Embedded Machine Learning: A Post-Training Approach With Incremental Clustering by Thommas K. S. Flores, Morsinaldo Medeiros, Marianne Silva, Daniel G. Costa, Ivanovitch Silva

    Published 2025-01-01
    “…While VQ is a technique that reduces model size by grouping similar parameters, incremental clustering, implemented via the AutoCloud K-Fixed algorithm, preserves accuracy during compression. …”
    Get full text
    Article
  13. 6433

    Architectural Gaps in Generative AI: Quantifying Cognitive Risks for Safety Applications by He Wen, Pingfan Hu

    Published 2025-06-01
    “…<b>Methods</b>: This study investigates whether architectural design elements in Transformer-based generative models contribute to a measurable divergence from human reasoning. …”
    Get full text
    Article
  14. 6434

    Performance Analysis of MVDR Beamformer Applied on an End-fire Microphone Array Composed of Unidirectional Microphones by Zoran ŠARIĆ, Miško SUBOTIĆ, Ružica BILIBAJKIĆ, Marko BARJAKTAROVIĆ, Nebojša ZDRAVKOVIĆ

    Published 2021-12-01
    “…Thirdly, we propose an adaptation of its adaptive algorithm during the pause of speech, which improves its robustness against the room reverberation and deviation from the optimal receiving direction. …”
    Get full text
    Article
  15. 6435

    Automatic mosaic method of remote sensing images based on machine vision by S.P. Gao, M. Xia, S.J. Zhang

    Published 2024-10-01
    “…To address the above issues, this study proposes an improved remote sensing image mosaic model on the bias of the Scale Invariant Feature Transform (SIFT) algorithm. …”
    Get full text
    Article
  16. 6436

    Risk identification and assessment of Internet public opinion on public emergencies based on Bayesian network and association rule mining by Mengjie You, Xuwei Pan, Chuwen Zhu

    Published 2025-07-01
    “…The core innovation lies in designing an improved scheme based on the CBA (Classification Based on Associations) algorithm to overcome the limitation of traditional association rule mining in handling non-Boolean data, thereby effectively extracting the correlations among public opinion risk factors to optimize the topological structure of the BN. …”
    Get full text
    Article
  17. 6437

    Data and Knowledge Dual-Driven Creep Life Prediction for Austenitic Heat-Resistance Steel by Xiaochang Xie, Mutong Liu, Ping Yang, Zenan Yang, Chengbo Pan, Chenchong Wang, Xiaolu Wei

    Published 2025-01-01
    “…In this study, we collected 216 creep data of austenitic heat-resistant steel, selected a variety of different machine learning algorithms to establish creep life prediction models, calculated and introduced a large amount of physical metallurgy knowledge highly related to creep based on Thermo-Calc, and converted the creep life into the form of the Larson–Miller parameter to optimize the data distribution, which effectively improved the prediction accuracy and interpretability of the model. …”
    Get full text
    Article
  18. 6438

    Research on the blockchain-based trusted ownership confirmation and value transfer system and its light weight of industrial data assets by WANG Dongchu, FU Yusun, YU Ya

    Published 2025-06-01
    “…The consensus protocol algorithm of the blockchain system was optimized based on the trustworthiness of nodes, reducing the probability of malicious attacks on nodes while improving the efficiency of system transaction consensus, achieving security and lightweight parallelism of the entire system. …”
    Get full text
    Article
  19. 6439

    Detecting Botrytis Cinerea Control Efficacy via Deep Learning by Wenlong Yi, Xunsheng Zhang, Shiming Dai, Sergey Kuzmin, Igor Gerasimov, Xiangping Cheng

    Published 2024-11-01
    “…Experimental results show that the validation loss of this method reaches 0.007, with a mean absolute error of 0.0148, outperforming other comparative models. This study enriches the theory of gray mold control and provides information technology for optimizing and selecting its inhibitors.…”
    Get full text
    Article
  20. 6440

    A growth posture identification method of immature peaches in natural environments by Jidong Lv, Liangliang Niu, Ying Han, Xiaoqin Sun, Lingyun Wang, Hailong Rong, Ling Zou

    Published 2024-11-01
    “…The model was easily deployed with improved detection speed. …”
    Get full text
    Article