Showing 441 - 460 results of 11,272 for search 'both’s algorithm', query time: 0.16s Refine Results
  1. 441

    Solving the maximum cut problem using Harris Hawk Optimization algorithm. by Md Rafiqul Islam, Md Shahidul Islam, Pritam Khan Boni, Aldrin Saurov Sarker, Md Asif Anam

    Published 2024-01-01
    “…The objective of the max-cut problem is to cut any graph in such a way that the total weight of the edges that are cut off is maximum in both subsets of vertices that are divided due to the cut of the edges. …”
    Get full text
    Article
  2. 442

    Predicting the Energetic Proton Flux with a Machine Learning Regression Algorithm by Mirko Stumpo, Monica Laurenza, Simone Benella, Maria Federica Marcucci

    Published 2024-01-01
    “…We present a simple and efficient machine learning regression algorithm that is able to forecast the energetic proton flux up to 1 hr ahead by exploiting features derived from the electron flux only. …”
    Get full text
    Article
  3. 443

    Impact on bias mitigation algorithms to variations in inferred sensitive attribute uncertainty by Yanchen Wang, Lisa Singh

    Published 2025-03-01
    “…One approach to improve trustworthiness and fairness in AI systems is to use bias mitigation algorithms. However, most bias mitigation algorithms require data sets that contain sensitive attribute values to assess the fairness of the algorithm. …”
    Get full text
    Article
  4. 444

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    “…In the present work, three ways BB84GA security systems have been demonstrated using trusted cryptographic techniques like an attribute-based authentication system, BB84 protocol, and genetic algorithm. Firstly, attribute-based authentication is used for identity-based access control and thereafter BB84 protocol is used for quantum key distribution between both parties and later the concept of genetic algorithm is applied for encryption/decryption of sensitive information across the private/public clouds. …”
    Get full text
    Article
  5. 445

    YOLO-SWD—An Improved Ship Recognition Algorithm for Feature Occlusion Scenarios by Ruyan Zhou, Mingkang Gu, Haiyan Pan

    Published 2025-03-01
    “…Ship detection and recognition hold significant application value in both military and civilian domains. With the continuous advancement of deep learning technologies, multi-category ship detection and recognition methods based on deep learning have garnered increasing attention. …”
    Get full text
    Article
  6. 446

    Co-evolutionary algorithm with a region-based diversity enhancement strategy by Kangshun Li, RuoLin Ruan, Shumin Xie, Hui Wang

    Published 2025-03-01
    “…To sustain the diversity within both populations, the algorithm dynamically adjusts the genetic operator based on the observed states of the populations. …”
    Get full text
    Article
  7. 447

    Trusted Web Service Discovery Based on a Swarm Intelligence Algorithm by Zhengwang Ye, Hehe Sheng, Haiyang Zou

    Published 2025-04-01
    “…The algorithm integrates a credibility-based trust model with the ant colony search algorithm to facilitate the discovery of trusted web services. …”
    Get full text
    Article
  8. 448
  9. 449

    Homogenization of the Probability Distribution of Climatic Time Series: A Novel Algorithm by Peter Domonkos

    Published 2025-05-01
    “…HPD can be performed by quantile matching or spatial interpolations, but both of them have drawbacks. This study presents a new algorithm which helps to increase homogenization accuracy in all temporal and spatial scales. …”
    Get full text
    Article
  10. 450
  11. 451

    A Novel Community Detection Algorithm Based on Node Propagation and Attraction by Lidong Fu, Xinxing Xie, Zengfa Dou, Yun Bai, Xi Zhao

    Published 2025-01-01
    “…Experimental results demonstrate that, on both synthetic and real networks, the proposed algorithm outperforms various existing community detection algorithms.…”
    Get full text
    Article
  12. 452

    A Streaming Algorithm for Online Estimation of Temporal and Spatial Extent of Delays by Kittipong Hiriotappa, Suttipong Thajchayapong, Pimwadee Chaovalit, Suporn Pongnumkul

    Published 2017-01-01
    “…Then, using a data set from Thailand, it is shown quantitatively that the proposed algorithm can detect and estimate delays associated with both recurring congestion and incident-induced nonrecurring congestion. …”
    Get full text
    Article
  13. 453

    The Application of Tree-Based Algorithms on Classifying Shunting Yard Departure Status by Niloofar Minbashi, Markus Bohlin, Carl-William Palmqvist, Behzad Kordnejad

    Published 2021-01-01
    “…Although the preliminary results presented in this paper are encouraging, future studies are needed to investigate the computational performance of tree-based algorithms using larger datasets and considering additional predictors.…”
    Get full text
    Article
  14. 454

    Image Inpainting Algorithm Based on Structure-Guided Generative Adversarial Network by Li Zhao, Tongyang Zhu, Chuang Wang, Feng Tian, Hongge Yao

    Published 2025-07-01
    “…The proposed methodology advances a two-stage restoration paradigm: (1) Structural Prior Extraction, where adaptive edge detection algorithms identify residual contours in corrupted regions, and a transformer-enhanced network reconstructs globally consistent structural maps through contextual feature propagation; (2) Structure-Constrained Texture Synthesis, wherein a multi-scale generator with hybrid dilated convolutions and channel attention mechanisms iteratively refines high-fidelity textures under explicit structural guidance. …”
    Get full text
    Article
  15. 455

    Research on hybrid strategy Particle Swarm Optimization algorithm and its applications by Jicheng Yao, Xiaonan Luo, Fang Li, Ji Li, Jundi Dou, Hongtai Luo

    Published 2024-10-01
    “…This paper introduces a novel Hybrid Strategy Particle Swarm Optimization (HSPSO) algorithm, which integrates adaptive weight adjustment, reverse learning, Cauchy mutation, and the Hook-Jeeves strategy to enhance both global and local search capabilities. …”
    Get full text
    Article
  16. 456

    Disorder Analytic Model-Based CMT Algorithms in Vehicular Sensor Networks by Changqiao Xu, Xiangzhou Xia, Jianfeng Guan, Hongke Zhang, Gabriel-Miro Muntean

    Published 2013-03-01
    “…By sensing, collecting, and delivering traffic-related information, VSNs can significantly improve both driving experience and traffic flow control, especially in constrained urban environments. …”
    Get full text
    Article
  17. 457
  18. 458

    A Morphology-Preserving Algorithm for Denoising of EMG-Contaminated ECG Signals by Vladimir Atanasoski, Jovana Petrovic, Lana Popovic Maneski, Marjan Miletic, Milos Babic, Aleksandra Nikolic, Dorin Panescu, Marija D. Ivanovic

    Published 2024-01-01
    “…The existing EMG-denoising algorithms often distort signal morphology, thus obscuring diagnostically relevant information. …”
    Get full text
    Article
  19. 459

    Dam Crack Instance Segmentation Algorithm Based on Improved YOLOv8 by Shuaisen Ma, Mingyue Xu, Weiwu Feng

    Published 2025-01-01
    “…Dam cracks are typically morphologically complex and suffer from severe background interference. Current algorithms often struggle to strike a balance between detection accuracy and segmentation precision. …”
    Get full text
    Article
  20. 460

    Harris Hawk optimization algorithm with combined perturbation strategy and its application by Zihe Wang, Xiaohui Wei

    Published 2025-07-01
    “…The test results, Friedman rank analysis, and Friedman test demonstrate that HHO-CPS significantly outperforms the other eleven algorithms in terms of both performance and robustness, with substantial differences in algorithm performance. …”
    Get full text
    Article