Search alternatives:
selection » detection (Expand Search)
Showing 961 - 980 results of 3,373 for search 'complex selection (coefficiency OR (efficient OR efficiency))', query time: 0.21s Refine Results
  1. 961

    STRUCTURAL GLOBAL SENSITIVITY METHOD BASED ON PARTIAL DERIVATIVE WHOLE DOMAIN INTEGRAL by TU LongWei, LIU Jie, LIU GuangZhao, ZHANG Zheng

    Published 2019-01-01
    “…Numerical example 2 illustrates the validity of the proposed method for complex high-dimensional model. Engineering example demonstrates the applicability and effectiveness of the present method for complex engineering structure problems.…”
    Get full text
    Article
  2. 962

    Drilling Condition Identification Method for Imbalanced Datasets by Yibing Yu, Huilin Yang, Fengjia Peng, Xi Wang

    Published 2025-03-01
    “…The BiLSTM component captures global contextual information, while the GRU efficiently learns features from complex sequential data. …”
    Get full text
    Article
  3. 963

    K-Gen PhishGuard: an Ensemble Approach for Phishing Detection with K-Means and Genetic Algorithm by Ali Al-Hafiz, Adnan Jabir, Shamala Subramaniam

    Published 2025-06-01
    “… Phishing detection is considered a critical problem in cybersecurity, and utilising machine learning with an efficient feature selection method for precisely identifying malicious websites is deemed the most critical challenge. …”
    Get full text
    Article
  4. 964
  5. 965

    The Issue of Hydrodynamic Friction in the Context of the Operational Properties of Ring-Shaped Torsional Vibration Dampers by Aleksander Mazurkow, Andrzej Chmielowiec, Wojciech Homik

    Published 2025-06-01
    “…Improving the reliability and durability of internal combustion engines in marine vessels is a complex issue. The vibrations generated in these engines significantly affect their proper operation. …”
    Get full text
    Article
  6. 966
  7. 967

    DDoSNet: Detection and prediction of DDoS attacks from realistic multidimensional dataset in IoT network environment by Goda Srinivasa Rao, P. Santosh Kumar Patra, V.A. Narayana, Avala Raji Reddy, G.N.V. Vibhav Reddy, D. Eshwar

    Published 2024-09-01
    “…Detecting and predicting such attacks in this complex and dynamic environment requires specialized techniques. …”
    Get full text
    Article
  8. 968

    Preparation of Magnetic Molecularly Imprinted Polymers Based on Group Sensing Quenching and Their Adsorption Characteristics on Signaling Molecules by Junqiang SUN, Haiyang YANG, Yao QU, Huarong YU, Fangshu QU, Yuxuan WAN

    Published 2025-02-01
    “…This selectivity is a key advantage of molecularly imprinted polymers, enabling the targeted removal of specific compounds from complex mixtures. …”
    Get full text
    Article
  9. 969

    Transforming Healthcare: A Review of Additive Manufacturing Applications in the Healthcare Sector by Alok Bihari Singh

    Published 2024-09-01
    “…The findings underscore AM’s transformative potential in advancing medical care and its significant impact on patient outcomes and surgical efficiency.…”
    Get full text
    Article
  10. 970

    Simple Single-Person Fall Detection Model Using 3D Pose Estimation Mechanisms by Jinmo Yang, R. Young Chul Kim

    Published 2024-01-01
    “…Our results show that SFDM outperforms selected other models in per-frame floating-point operations, achieving the lowest model complexity. …”
    Get full text
    Article
  11. 971

    Reflective Distributed Denial of Service Detection: A Novel Model Utilizing Binary Particle Swarm Optimization—Simulated Annealing for Feature Selection and Gray Wolf Optimization-... by Daoqi Han, Honghui Li, Xueliang Fu

    Published 2024-09-01
    “…Therefore, feature selection (FS) is particularly important in IDSs. By selecting the most representative features, it can not only improve the detection accuracy but also significantly reduce the computational complexity and attack detection time. …”
    Get full text
    Article
  12. 972

    Enhanced dry SO₂ capture estimation using Python-driven computational frameworks with hyperparameter tuning and data augmentation by Robert Makomere, Hilary Rutto, Alfayo Alugongo, Lawrence Koech, Evans Suter, Itumeleng Kohitlhetse

    Published 2025-04-01
    “…The model complexity arising from hyperparameter configurations was appraised based on the Bayesian information criterion and the Akaike information criterion. …”
    Get full text
    Article
  13. 973
  14. 974

    AMCL: supervised contrastive learning with hard sample mining for multi-functional therapeutic peptide prediction by Jiwei Fang, Henghui Fan, Jintao Zhao, Jianping Zhao, Junfeng Xia

    Published 2025-07-01
    “…However, the identification of peptide functions through wet-lab experiments is both time-consuming and costly, necessitating efficient computational prediction methods. The field faces challenges such as long-tail distribution problems, data sparsity, and complex label co-occurrence patterns due to peptides’ multi-functional nature. …”
    Get full text
    Article
  15. 975
  16. 976
  17. 977

    Optimized Design of Distributed Generalized Reed-Solomon Coded Generalized Spatial Modulation by C. L. Zhao, F. F. Yang, H. J. Xu

    Published 2025-06-01
    “…When the GRS codes at the source and relay have large information lengths, the OISS algorithm possesses high complexity. Thus, a low-complexity optimized information symbol selection (LC-OISS) algorithm by incomplete search is put forward. …”
    Get full text
    Article
  18. 978
  19. 979
  20. 980

    An effectiveness assessment ensemble for transmission corridor mechanized construction schemes based on weighted itemset mining and factor criticality analysis by Xin Yang, Junyao Hu, Chenhao Sun, Yafei Huang, Ci Tang, Jie Huang

    Published 2025-04-01
    “…With this motivation, this paper establishes an ensemble to address the issue of effective level diagnoses, and thus the hidden patterns and regularities between scheme features and effective levels can be explored. Based on the complex characteristics of input data, the Pearson correlation coefficient is deployed to handle the multidimensional data from multiple sources, and K-means clustering is then employed to classify scheme indicators into classes. …”
    Get full text
    Article