Showing 821 - 840 results of 3,083 for search 'life algorithm', query time: 0.12s Refine Results
  1. 821

    Landscape Design Methodology: Pattern formation through the use of Cellular Automata by Sergi Abellán Sanfélix, Marcel Bilurbina Camps, Marilena Christodoulou

    Published 2019-07-01
    “…Parameters related to the growth and morphologic characteristics of the species as well as programmatic and aesthetic parameters of the project may be introduced as rules that influence the behavior of the CA algorithm. The algorithm developed is called NNB-CA (Natural Neighbouring Behaviour Cellular Automata) and it is based on John Conway’s original “Game of Life” CA. …”
    Get full text
    Article
  2. 822
  3. 823

    The frequency property estimation for the attachment oscillator in the nanophysics by Kang-Jia Wang, Jing Si

    Published 2023-10-01
    “…Vibration phenomena can be seen everywhere in our daily life, and finding their amplitude frequency relationship (AFR) quickly and accurately is of great significance. …”
    Get full text
    Article
  4. 824

    Research on intelligent optimization of cryptogram service scheduling for service composition by Jian-jun LI, Bin YU, Wu-ping CHEN

    Published 2013-08-01
    “…And a hybrid discrete shuffled frog-leaping algorithm was proposed to solve cryptogram service scheduling problem. …”
    Get full text
    Article
  5. 825
  6. 826

    A two-stage optimization model for relief logistics and distribution to disaster survivors under two-fold uncertainty by Palash Sahoo

    Published 2024-12-01
    “…The efficiency of our proposed approach is demonstrated with a real-life numerical example.…”
    Get full text
    Article
  7. 827

    Research on multi-objective energy optimization design for multi-story residential buildings in Suzhou region based on artificial neural networks by Zhongcheng Duan, Leilei Wang, Binhao Li, Gang Yao

    Published 2025-09-01
    “…Compared with the original design, energy consumption, thermal comfort, and life-cycle CO2 emissions improved by 45.8 %, 12.2 %, and 28.0 %, respectively. …”
    Get full text
    Article
  8. 828

    Iris Recognition System Using Advanced Segmentation Techniques and Fuzzy Clustering Methods for Robotic Control by Slim Ben Chaabane, Rafika Harrabi, Hassene Seddik

    Published 2024-11-01
    “…Then, the bald eagle search (BES) algorithm is employed to locate and isolate the iris region. …”
    Get full text
    Article
  9. 829

    Machine learning methods in the differential diagnosis of difficult-to-classify types of diabetes mellitus by N. V. Rusyaeva, I. I. Golodnikov, I. V. Kononenko, T. V. Nikonova, M. V. Shestakova

    Published 2023-11-01
    “…Among them are algorithms for the differential diagnosis of T1DM and T2DM, algorithms specializing in the diagnosis of only LADA or only MODY, only one algorithm is aimed at multiclass classification of patients with diabetes. …”
    Get full text
    Article
  10. 830
  11. 831

    Corrosion Risk Assessment in Coastal Environments Using Machine Learning-Based Predictive Models by Marta Terrados-Cristos, Marina Diaz-Piloneta, Francisco Ortega-Fernández, Gemma Marta Martinez-Huerta, José Valeriano Alvarez-Cabal

    Published 2025-07-01
    “…Among the models tested, tree-based algorithms, particularly gradient boosting, provided the highest prediction accuracy (F1 score: 0.8673). …”
    Get full text
    Article
  12. 832

    Finite element method in computer simulation for improved patient care in dentistry: A systematic review by Denis Yu. Dyachenko, Svetlana V. Dyachenko

    Published 2021-10-01
    “…This will reduce the number of visits, peri- and posttreatment error and complication rates for the improved patient’s quality of life and social rehabilitation.…”
    Get full text
    Article
  13. 833

    Construction of a predictive model for cognitive impairment among older adults in Northwest China by Yu Wang, Ni Wang, Yanjie Zhao, Xiaoyan Wang, Yuqin Nie, Liping Ding

    Published 2025-07-01
    “…We used random forest algorithms to select important features from potential predictors. …”
    Get full text
    Article
  14. 834
  15. 835

    Accurate and robust prediction of Amyloid-β brain deposition from plasma biomarkers and clinical information using machine learning by Jiayuan Xu, Andrew J. Doig, Sofia Michopoulou, Sofia Michopoulou, Petroula Proitsi, Petroula Proitsi, Fumie Costen, The Alzheimer's disease neuroimaging initiative

    Published 2025-08-01
    “…BackgroundAlzheimer's disease (AD) greatly affects the daily functioning and life quality of patients and is prevalent in the elderly population. …”
    Get full text
    Article
  16. 836

    Research on Energy-Efficient Building Design Using Target Function Optimization and Genetic Neural Networks by Youxiang Huan

    Published 2025-01-01
    “…This paper utilizes the EnergyPlus API to directly call the simulation engine from within the optimization algorithm. The genetic neural network algorithm iteratively modifies design parameters (e.g., building orientation, insulation levels etc) and evaluates the resulting energy performance using EnergyPlus. …”
    Get full text
    Article
  17. 837

    INVESTIGATING MULTICOLLINEARITY BETWEEN COUNTRY’S LEVEL OF DIGITAL COMPETITIVENESS AND INFLUENCING VARIABLES by Kateryna Kraus, Nataliia Kraus, Bohdan Semenovych

    Published 2025-04-01
    “…The study is based on the method of multicollinearity according to the Farrar-Glauber algorithm, which makes it possible to understand the dependence of the level of digital competitiveness on three variable factors (GDP per capita, the number of people in the country and the Digital Quality of Life Index). …”
    Get full text
    Article
  18. 838

    Research on network attack analysis method based on attack graph of absorbing Markov chain by Haiyan KANG, Molan LONG

    Published 2023-02-01
    “…Existing intrusion path studies based on attack graph lack consideration of factors other than basic network environment information when calculating the state transition probability.In order to analyze the security of target network comprehensively and reasonably, a network attack analysis method based on attack graph of absorbing Markov chain was proposed.Firstly, a state transition probability normalization algorithm based on vulnerability life cycle was proposed based on attack graph.Secondly, the attack graph was mapped to the absorbing Markov chain and the state transition probability matrix was given.Finally, the state transition probability matrix was calculated to comprehensively analyze the node threat degree, attack path length and expected impact of the target network.The results show that the proposed method can effectively analyze the expected influence of node threat degree, attack path length and vulnerability life cycle on the whole network, which is helpful for security research personnel to better understand the security state of the network.…”
    Get full text
    Article
  19. 839

    Improving lifetime of WSN using modified Moth Flame Optimization by Methaq Mahdi Ali, Razieh Asgarnezhad

    Published 2023-09-01
    “…WSNs face difficulties in reducing energy output and shortening life cycles, including node configuration, leader selection, and optimal routing selection. …”
    Get full text
    Article
  20. 840

    RUL Prediction for Lithium Battery Systems in Fuel Cell Ships Based on Adaptive Modal Enhancement Networks by Yifan Liu, Huabiao Jin, Xiangguo Yang, Telu Tang, Jiaxin Luo, Lei Han, Junting Lang, Weixin Zhao

    Published 2025-02-01
    “…As an auxiliary power source in fuel cell systems, the prediction of the Remaining Useful Life (RUL) of lithium-ion batteries is crucial for enhancing the reliability and efficiency of fuel cell ships. …”
    Get full text
    Article