Search alternatives:
whole » while (Expand Search)
Showing 301 - 320 results of 1,170 for search 'whole algorithm', query time: 0.08s Refine Results
  1. 301
  2. 302

    Features of measles diagnostics and prevention at the present stage by Ya. M. Eremoshkina, T. K. Kuskova, E. T. Vdovina, A. V. Savina, M. V. Bogdanova, S. I. Kotiv

    Published 2021-06-01
    “…The algorithm for diagnosing measles, presented in this article, allows to suspect this disease at the early stages. …”
    Get full text
    Article
  3. 303

    Malware detection approach based on improved SOINN by Bin ZHANG, Lixun LI, Shuqin DONG

    Published 2019-12-01
    “…To deal with the problems of dynamic update of detection model and high computation costs in malware detection model based on batch learning,a novel malware detection approach is proposed by combing SOINN and supervised classifiers,to reduce computation costs and enable the detection model to update dynamically with the assistance of SOINN′s incremental learning characteristic.Firstly,the improved SOINN was given.According to the whole alignment algorithm,search the adjusted weights of neurons under all input sequences in the learning cycle and then calculate the average value of all adjusted weights as the final result,to avoid SOINN′s stability under different input sequences and representativeness of original data,therefore improve malware detection accuracy.Then a data preprocessing algorithm was proposed based on nonnegative matrix factor and Z-score normalization to transfer the malware behavior feature vector from high dimension and high order to low dimension and low order,to speed up and avoid overfitting and further improve detection accuracy.The results of experiments show that proposed approach supports dynamic updating of detection model and has a significantly higher accuracy of detecting unknown new samples and lower computation costs than tradition methods.…”
    Get full text
    Article
  4. 304
  5. 305

    Development and Design of an Optimal Fuzzy Logic Two Degrees of Freedom-Proportional Integral Derivative Controller for a Two-Area Power System Using the Bee Algorithm by Sitthisak Audomsi, Supannika Wattana, Narongkorn Uthathip, Worawat Sa-ngiamvibool

    Published 2025-02-01
    “…This study introduces a fuzzy logic-based two-degree-of-freedom PID (FL2DOF-PID) controller that is optimized using the Bee Algorithm (BA) to control the load frequency in a two-area linked power system that has both reheat thermal power plants and hydro power plants. …”
    Get full text
    Article
  6. 306
  7. 307

    Machine learning-based prediction of antimicrobial resistance and identification of AMR-related SNPs in Mycobacterium tuberculosis by Yi Xu, Ying Mao, Xiaoting Hua, Yan Jiang, Yi Zou, Zhichao Wang, Zubi Liu, Hongrui Zhang, Lingling Lu, Yunsong Yu

    Published 2025-07-01
    “…The employment of machine learning on whole-genome sequencing data (WGS) presents significant potential for uncovering the genomic mechanisms underlying drug resistance in MTB. …”
    Get full text
    Article
  8. 308

    Suitability of different machine learning algorithms for the classification of the proportion of grassland-based forages at the herd level using mid-infrared spectral information f... by A. Birkinshaw, M. Sutter, M. Nussbaum, M. Kreuzer, B. Reidy

    Published 2024-12-01
    “…Our results suggest that in general, LASSO and PLS-DA machine learning algorithms perform better for dietary GBF classification than RF or SVM algorithms.…”
    Get full text
    Article
  9. 309

    Research on SaaS Support Architecture and Key Technologies by Xiaodong Zhang, Lanshun Nie, Fanchao Meng

    Published 2013-12-01
    “…The problems of performance and scalability by consistent hashing feedback algorithm and three stages of dynamical extending and deploying strategy were solved. …”
    Get full text
    Article
  10. 310

    Hybridization of Galactic Swarm and Evolution Whale Optimization for Global Search Problem by Binh Minh Nguyen, Trung Tran, Thieu Nguyen, Giang Nguyen

    Published 2020-01-01
    “…The Whale Optimization Algorithm mimics the unusual social behaviors and the hunting activities of humpback whales. …”
    Get full text
    Article
  11. 311

    Integrated optimization model for production and equipment dispatching in underground mines by LI Guo-qing, HOU Jie, HU Nai-lian

    Published 2018-09-01
    “…Each step of stope mining has a significant effect on the whole mining plan; therefore, it is very important to form a reasonable configuration to achieve the mining plan target. …”
    Get full text
    Article
  12. 312

    Differential Study on Estimation Models for Indica Rice Leaf SPAD Value and Nitrogen Concentration Based on Hyperspectral Monitoring by Yufen Zhang, Kaiming Liang, Feifei Zhu, Xuhua Zhong, Zhanhua Lu, Yibo Chen, Junfeng Pan, Chusheng Lu, Jichuan Huang, Qunhuan Ye, Yuanhong Yin, Yiping Peng, Zhaowen Mo, Youqiang Fu

    Published 2024-12-01
    “…For prediction of leaf SPAD value and LNC, the model constructed with the RF algorithm based on whole growth periods of spectral reflectance performed the best, with R<sup>2</sup> values of 0.99 and 0.98 and NRMSE values of 2.99% and 4.61%. …”
    Get full text
    Article
  13. 313
  14. 314

    Optimization of the parameters of truss beams with two posts by A. K. Yusupov, H. M. Musеlеmov, T. O. Ustarhanov

    Published 2021-11-01
    “…The proposed method and algorithm testify to the efficiency and rationality of the obtained optimal parameter of the structure as a whole.…”
    Get full text
    Article
  15. 315

    Optimizing Vehicle Body Cross-Sections Using a Parametric Mathematical Model by Zhaohui Hu, Shuai Mo, Huang Liu, Fuhao Mo

    Published 2024-12-01
    “…Then, the stochastic gradient genetic algorithm is used to optimize the solution and determine the geometric parameters of each section. …”
    Get full text
    Article
  16. 316
  17. 317

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  18. 318

    Novel barrier-reinforcing method based on mobile nodes re-deployment in WSN by Guoyong DAI, Weiyuan SHI, Kezhen YING, Qingzhang CHEN, Keji MAO

    Published 2017-06-01
    “…Barrier coverage in wireless sensor networks plays a key role in intrusion detection system.How to build a robust barrier is a key problem in this research area.In order to fix the weak points caused by nodes’ energy consumption,a reinforcing method was proposed to strengthen the barrier by re-deploying some mobile nodes,in which set-based max-flow algorithm was employed to calculate the number of weak points.The vulnerability degree of each weak point was analyzed so that the mobile nodes can move to these spots to reinforce the whole barrier.Experiment results show that the algorithm can effectively strengthen the barrier,extend the survival time of the barrier and the algorithm complexity is relatively lower.…”
    Get full text
    Article
  19. 319
  20. 320