Showing 1,981 - 2,000 results of 11,272 for search 'both’s algorithm', query time: 0.16s Refine Results
  1. 1981

    Detection of dental caries under fixed dental prostheses by analyzing digital panoramic radiographs with artificial intelligence algorithms based on deep learning methods by Betül Ayhan, Enes Ayan, Saadet Atsü

    Published 2025-02-01
    “…Caries under the FDPs were detected using both the YOLOv7 and the improved YOLOv7 (YOLOv7 + CBAM) models. …”
    Get full text
    Article
  2. 1982
  3. 1983

    Predicting cardiovascular outcomes in Chinese patients with type 2 diabetes by combining risk factor trajectories and machine learning algorithm: a cohort study by Qi Huang, Xiantong Zou, Zhouhui Lian, Xianghai Zhou, Xueyao Han, Yingying Luo, Shuohua Chen, Yanxiu Wang, Shouling Wu, Linong Ji

    Published 2025-02-01
    “…Stratification by the ML-CVD-C score showed substantial improvement, with NRI gains of 57.7%, 44.1%, and 47.3%, and IDI gains of 10.1%, 7.9%, and 8.4% compared to the other three scores. Both the trajectory and machine learning algorithm contributed significantly to the enhancement of model performance. …”
    Get full text
    Article
  4. 1984
  5. 1985

    Random forest algorithm integrated with an initial basic feasible solution in buckling analysis of a two-dimensional functionally graded porous taper beam by Ravikiran Chinthalapudi, Jagadesh Kumar Jatavallabhula, Geetha Narayanan Kannaiyan, Bridjesh Pappula, Seshibe Makgato

    Published 2025-01-01
    “…To overcome these limitations, a hybrid analytical computational methodology is proposed that integrates the novel Initial Basic Feasible Solution approach with the Random Forest algorithm. The beam is modelled using hyperbolic shear deformation theory to account for transverse shear effects, while material properties vary along both the length and thickness following a power-law distribution. …”
    Get full text
    Article
  6. 1986

    Inversion of citrus SPAD value and leaf water content by combining feature selection and ensemble learning algorithm using UAV remote sensing images by Quanshan Liu, Fei Chen, Ningbo Cui, Zongjun Wu, Xiuliang Jin, Shidan Zhu, Shouzheng Jiang, Daozhi Gong, Shunsheng Zheng, Lu Zhao, Zhihui Wang

    Published 2025-06-01
    “…Compared to the SVR, Ada and SVR-Ada, the WOA-SVR-Ada model, constructed by combining the DT algorithm with VI+TF as inputs (WOA-SVR-AdaD3), exhibited the highest estimation accuracy for both SPAD value and LWC. …”
    Get full text
    Article
  7. 1987

    Technical note: Applicability of physics-based and machine-learning-based algorithms of a geostationary satellite in retrieving the diurnal cycle of cloud base height by M. Wang, M. Min, J. Li, H. Lin, Y. Liang, B. Chen, Z. Yao, N. Xu, M. Zhang

    Published 2024-12-01
    “…An identifiable issue arises with significant underestimations in the retrieved CBH by both ML-based algorithms, leading to an inability to capture the diurnal cycle characteristics of CBH. …”
    Get full text
    Article
  8. 1988

    Optimized Type-2 Fuzzy Logic Control for Low-Speed Vehicle Pedal Pressing Automation Using Hybrid Spiral Sine Cosine Algorithm by Azrul Azim Abdullah Hashim, Nor Maniha Abdul Ghani, Salmiah Ahmad, Mohd Ruzaini Hashim, Noor Zirwatul Ahlam Naharuddin, Addie Irawan

    Published 2025-01-01
    “…The research investigates two FLC approaches: the standard Type 1 FLC and the advanced Type 2 FLC, both optimized using the Hybrid Spiral Sine Cosine Algorithm (SSCA). …”
    Get full text
    Article
  9. 1989

    Mechanism-learning prediction model for pitting depth of buried pipeline based on HMOGWO-RF by Fulin SONG, Hong ZHAO, Xingyuan MIAO

    Published 2024-11-01
    “…By leveraging the combination of the three-objective HMOGWO algorithm and the RF model, it significantly outperformed the three-objective MOGWO algorithm, the two-objective HMOGWO algorithm, the two-objective MOGWO algorithm, as well as both the single-objective GWO algorithm and the single-objective PSO algorithm in terms of prediction performance and stability. …”
    Get full text
    Article
  10. 1990

    Indices formal grammar of the Universal Decimal Classification by V. N. Beloozerov, A. V. Shapkin

    Published 2018-12-01
    “…The proposed algorithm is applicable both to visualize the meaning of complex class numbers, and to ensure the completeness and accuracy of the documents retrieval by the UDC classes.…”
    Get full text
    Article
  11. 1991

    Research on Energy-Saving Optimization Control Strategy for Distributed Hub Motor-Driven Vehicles by Bin Huang, Jinyu Wei, Minrui Ma, Xu Yang

    Published 2025-06-01
    “…Aiming at the problems of energy utilization efficiency and braking stability in electric vehicles, a high-efficiency and energy-saving control strategy that takes both driving and braking into account is proposed with the distributed hub motor-driven vehicle as the research object. …”
    Get full text
    Article
  12. 1992

    Model of Automatic Classification and Localization of Images by L. V. Serebryanaya, K. Y. Bochkarev, A. Y. Popitich

    Published 2019-05-01
    “…Analysis of models, methods and algorithms has shown that for solving the set task it is preferable to use machine learning, an artificial neural network and a genetic algorithm. …”
    Get full text
    Article
  13. 1993

    action-rules: GPU-accelerated Python package for counterfactual explanations and recommendations by Lukáš Sýkora, Tomáš Kliegr

    Published 2025-02-01
    “…The action-rules package provides an efficient method for mining action rules using the Action-Apriori algorithm, a modification of the traditional Apriori algorithm tailored specifically for action rule mining. …”
    Get full text
    Article
  14. 1994

    MVTC-Sec: Lightweight Timestamp Correlation for Securing RPL Against DIO Replay Attacks by Tahar Guerbouz, Akram Zine Eddine Boukhamla, Djalila Belkebir, Sahraoui Dhelim

    Published 2025-01-01
    “…Such attacks destabilize the network topology, reduce the packet delivery ratio (PDR), and increase both latency and energy consumption. To address these issues, this paper proposes MVTC-Sec, a Mathematically Validated Timestamp Correlation method that detects replay-based DIO attacks by analyzing deviations from the expected Trickle algorithm timing. …”
    Get full text
    Article
  15. 1995

    Retrieval of Leaf Area Index for Wheat and Oilseed Rape Based on Modified Water Cloud Model and SAR Data by Xiyue Yang, Wangfei Zhang, Armando Marino, Han Zhao, Wei Kang, Zhengyong Xu

    Published 2025-06-01
    “…The proposed MWCM parameters were calibrated using an iterative optimization algorithm named the Levenberg–Marquardt (LM) algorithm. …”
    Get full text
    Article
  16. 1996

    Research of fast decoding for longer constraint length convolutional codes by HUANG Xiao-ling, YANG Hua-long

    Published 2010-01-01
    “…To overcome the disadvantage of Viterbi decoding algorithm, in which its complexity exponentially increases with the increasing constraint length of convolutional codes, and the decoding delay was too large to fit the decoding of longer constraint length convolutional codes, a fast decoding of convolutional codes for longer constraint length, based on improved particle swarm optimization algorithm, was proposed. …”
    Get full text
    Article
  17. 1997

    Research of fast decoding for longer constraint length convolutional codes by HUANG Xiao-ling, YANG Hua-long

    Published 2010-01-01
    “…To overcome the disadvantage of Viterbi decoding algorithm, in which its complexity exponentially increases with the increasing constraint length of convolutional codes, and the decoding delay was too large to fit the decoding of longer constraint length convolutional codes, a fast decoding of convolutional codes for longer constraint length, based on improved particle swarm optimization algorithm, was proposed. …”
    Get full text
    Article
  18. 1998

    Construction and Completion of the Knowledge Graph for Cow Estrus with the Association Rule Mining by Zhiwei Cheng, Luyu Ding, Cheng Peng, Helong Yu, Baozhu Yang, Ligen Yu, Qifeng Li

    Published 2025-05-01
    “…The algorithm’s optimization bolstered its scalability, making it more adaptable to future data expansions and complex knowledge integrations. …”
    Get full text
    Article
  19. 1999

    Shallow-Depth Quantum Circuit for Unstructured Database Search by Junpeng Zhan

    Published 2024-10-01
    “…Grover’s search algorithm (GSA) offers quadratic speedup in searching unstructured databases but suffers from exponential circuit depth complexity. …”
    Get full text
    Article
  20. 2000

    Lightweight malicious domain name detection model based on separable convolution by Luhui YANG, Huiwen BAI, Guangjie LIU, Yuewei DAI

    Published 2020-12-01
    “…The application of artificial intelligence in the detection of malicious domain names needs to consider both accuracy and calculation speed,which can make it closer to the actual application.Based on the above considerations,a lightweight malicious domain name detection model based on separable convolution was proposed.The model uses a separable convolution structure.It first applies depthwise convolution on every input channel,and then performs pointwise convolution on all output channels.This can effectively reduce the parameters of convolution process without impacting the effectiveness of convolution feature extraction,and realize faster convolution process while keeping high accuracy.To improve the detection accuracy considering the imbalance of the number and difficulty of positive and negative samples,a focal loss function was introduced in the training process of the model.The proposed algorithm was compared with three typical deep-learning-based detection models on a public data set.Experimental results denote that the proposed algorithm achieves detection accuracy close to the state-of-the-art model,and can significantly improve model inference speed on CPU.…”
    Get full text
    Article