Showing 261 - 280 results of 3,108 for search 'Algorithmic training evaluation', query time: 0.10s Refine Results
  1. 261

    Frost Resistance Prediction of Concrete Based on Dynamic Multi-Stage Optimisation Algorithm by Xuwei Dong, Jiashuo Yuan, Jinpeng Dai

    Published 2025-07-01
    “…To predict the frost resistance of concrete more accurately, based on the four ensemble learning models of random forest (RF), adaptive boosting (AdaBoost), categorical boosting (CatBoost), and extreme gradient boosting (XGBoost), this paper optimises the ensemble learning models by using a dynamic multi-stage optimisation algorithm (DMSOA). These models are trained using 7090 datasets, which use nine features as input variables; relative dynamic elastic modulus (RDEM) and mass loss rate (MLR) as prediction indices; and six indices of the coefficient of determination (R<sup>2</sup>), mean square error (MSE), root mean square error (RMSE), mean absolute error (MAE), correlation coefficient (CC), and standard deviation ratio (SDR) are selected to evaluate the models. …”
    Get full text
    Article
  2. 262

    Sharpbelly Fish Optimization Algorithm: A Bio-Inspired Metaheuristic for Complex Engineering by Jian Liu, Rong Wang, Yonghong Deng, Xiaona Huang, Zhibin Li

    Published 2025-07-01
    “…The experimental results demonstrate that SFO consistently achieves competitive or superior optimization accuracy and convergence speed compared to seven state-of-the-art metaheuristic algorithms. Furthermore, the algorithm is applied to three classical constrained engineering design problems: pressure vessel, speed reducer, and gear train design. …”
    Get full text
    Article
  3. 263

    Modeling and Optimization of Concrete Mixtures Using Machine Learning Estimators and Genetic Algorithms by Ana I. Oviedo, Jorge M. Londoño, John F. Vargas, Carolina Zuluaga, Ana Gómez

    Published 2024-06-01
    “…Using a dataset of over 19,000 samples from a local ready-mix concrete producer, various predictive ML models were trained and evaluated regarding cost-effective solutions. …”
    Get full text
    Article
  4. 264

    Inconsistency evaluation of the curriculum logical structure by Yu. D. Ageev, S. V. Fedoseev, Yu. A. Kavin, S. G. Vorona, I. S. Pavlovskiy

    Published 2018-11-01
    “…Violation of this logic becomes apparent only directly during the training sessions.A large variety of quantitative methods uses indicators that do not reveal structural deficiencies in the curriculum. …”
    Get full text
    Article
  5. 265

    Voice pathology detection using machine learning algorithms based on different voice databases by Nurul Mu'azzah Abdul Latiff, Fahad Taha Al-Dhief, Nurul Fariesya Suhaila Md Sazihan, Marina Mat Baki, Nik Noordini Nik Abd. Malik, Musatafa Abbas Abbood Albadr, Ali Hashim Abbas

    Published 2025-03-01
    “…Unlike traditional approaches that focus solely on single-database training and testing, this study presents a cross-database evaluation strategy to assess the robustness and generalizability of machine learning algorithms for voice pathology detection. …”
    Get full text
    Article
  6. 266

    Classification of Service Sentiments on the by.U Application using the Support Vector Machine Algorithm by Zulkarnain Zulkarnain, Rice Novita, Angraini Angraini, Zarnelly Zarnelly

    Published 2025-07-01
    “…The evaluation results showed that the SVM algorithm achieved an accuracy of 83% in classifying sentiments. …”
    Get full text
    Article
  7. 267
  8. 268

    Machine Learning for Chinese Corporate Fraud Prediction: Segmented Models Based on Optimal Training Windows by Chang Chuan Goh, Yue Yang, Anthony Bellotti, Xiuping Hua

    Published 2025-05-01
    “…Using the best machine learning model and optimal training window, we build general model and segmented models to compare fraud types and industries based on their respective predictive performance via four evaluation metrics and top features using SHAP. …”
    Get full text
    Article
  9. 269
  10. 270

    Genetic Artificial Hummingbird Algorithm-Support Vector Machine for Timely Power Theft Detection by Emmanuel Gbafore, Davies Rene Segera, Cosmas Raymond Mutugi Kiruki

    Published 2024-01-01
    “…The methodology entailed data preprocessing, data split into training, validation, and testing sets in an 80-10-10 ratio, z-score normalization, optimization, training, validation, testing, and computation of six evaluation metrics. …”
    Get full text
    Article
  11. 271

    Optimization of Business English Teaching Based on the Integration of Interactive Virtual Reality Genetic Algorithm by Xiao Ma

    Published 2022-01-01
    “…The results of the simulation experiment indicate that the improved algorithm designed in this article can reduce the computational overhead of the meta-algorithm to a great extent, and the improvement strategy is designed based on the evaluation results of practical examples.…”
    Get full text
    Article
  12. 272

    Efficient Deep Learning Models Revolutionize Doctor&#x2019;s Training for Point-of-Care Ultrasound by Hsin-Hung Chou, Yi-Chung Chang, Wan-Ching Lien, Lung-Chun Lin, Xing-Zheng Lin, Ting-En Hsu, Yueh-Ping Liu, Li Liu, Yen-Ting Chan, Feng-Sen Kuan

    Published 2025-01-01
    “…The overall sensitivity increased by 4% in the classification task after training with the UNet++ model, although there were no statistically significant differences in all evaluation metrics. …”
    Get full text
    Article
  13. 273

    An algorithm for variational inclusion problems including quasi-nonexpansive mappings with applications in osteoporosis prediction by Raweerote Suparatulatorn, Wongthawat Liawrungrueang, Thanasak Mouktonglang, Watcharaporn Cholamjiak

    Published 2025-02-01
    “…From the experimental results, our proposed algorithm consistently outperforms existing algorithms across multiple evaluation metrics. …”
    Get full text
    Article
  14. 274

    A multi objective collaborative reinforcement learning algorithm for flexible job shop scheduling by Jian Li, Shifa Li, Pengbo He, Huankun Li

    Published 2025-07-01
    “…Reward parameters are computed based on temporal differences at various moments, constructing a multi-objective Markov decision-process training model. Using hypervolume, set coverage and inverted generational distance as evaluation metrics, the algorithm is compared with those proposed in other studies on standard instances. …”
    Get full text
    Article
  15. 275

    Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine by Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable

    Published 2022-01-01
    “…In the first level, the firefly algorithm (FFA) and the CfsSubsetEval feature section method have been applied to optimize the subset of features, while in the second level, the support vector machine classifier has been used to build the training model for the detection of credit card fraud cases. …”
    Get full text
    Article
  16. 276

    Research on the Construction of Event Evolutionary Graph for Urban Rail Transit Train Operation and Maintenance Safety by FAN Qianqi, ZUO Jianyong, GONG Ming, JIA Bo, LI Zhengjiang

    Published 2025-04-01
    “…[Method] Focusing on the construction of event evolutionary graph for urban rail train operation and maintenance safety, three key steps for constructing the event evolutionary graph are optimized. …”
    Get full text
    Article
  17. 277
  18. 278

    Predictive PID Control for Automated Guided Vehicles Using Genetic Algorithm and Machine Learning by Kinza Nazir, Yong-Woon Kim, Yung-Cheol Byun

    Published 2025-01-01
    “…A custom simulator, designed with Webots, facilitated realistic testing environments, and comprehensive dataset with systematically varied track geometries was curated for training and evaluation. Results demonstrate the proposed framework&#x2019;s ability to maintain high tracking accuracy while significantly reducing computational costs, with SVR predictions closely approximating the GA-derived benchmarks. …”
    Get full text
    Article
  19. 279

    Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing by Andrea Venturi, Mauro Andreolini, Mirco Marchetti, Michele Colajanni

    Published 2024-12-01
    “…The main contribution of this paper is to fill this gap by investigating the generalization capabilities of existing DRL agents to extend their VAPT operations to hosts that were not used in the training phase. To this purpose, we define a novel VAPT environment through which we devise multiple evaluation scenarios. …”
    Get full text
    Article
  20. 280

    Identification of Alcoholism Based on Wavelet Renyi Entropy and Three-Segment Encoded Jaya Algorithm by Shui-Hua Wang, Khan Muhammad, Yiding Lv, Yuxiu Sui, Liangxiu Han, Yu-Dong Zhang

    Published 2018-01-01
    “…The classifier was constructed based on feedforward neural network and a three-segment encoded (TSE) Jaya algorithm providing parameter-free training of the weights, biases, and number of hidden neurons. …”
    Get full text
    Article