Showing 361 - 380 results of 4,946 for search 'different (evolution OR evaluation) algorithm', query time: 0.20s Refine Results
  1. 361

    Improvement of Differential Privacy K-means Clustering Algorithm by GUO Rumin, CHEN Xuebin, SHAN Liyang

    Published 2024-08-01
    “…Comparative experiments on three different feature datasets are conducted to evaluate the improved algorithm. …”
    Get full text
    Article
  2. 362

    Hierarchical Quantum Architecture Search for Variational Quantum Algorithms by Tong Zhao, Bo Chen, Guanting Wu, Liang Zeng

    Published 2024-01-01
    “…We provide a numerical analysis of the theoretical advantages of the proposed framework in reducing the search space. To evaluate practical performance, we conduct experiments on quantum chemistry tasks with different algorithm combinations integrated into the framework. …”
    Get full text
    Article
  3. 363

    A novel reindeer cyclone optimization algorithm (RCOA) by Gopal Chaudhary, Bharat S. Rawal

    Published 2025-04-01
    “…On multimodal functions, RCOA shows more competitive performance, especially in terms of stability, with an improvement of around 10–15% in accuracy and consistency compared to WDO and PSO. The algorithm is evaluated using the CEC’17 benchmark suite with 50 dimensions and compared against different well-established optimization algorithms, including WOA, PSO, GSA, and DE. …”
    Get full text
    Article
  4. 364

    Surprisal-based algorithm for detecting anomalies in categorical data by Ossama Cherkaoui, Houda Anoun, Abderrahim Maizate

    Published 2025-06-01
    “…This study proposed and tested the novel categorical surprisal anomaly detection algorithm (CSAD) by comparing and evaluating it against six competitors. …”
    Get full text
    Article
  5. 365

    Tunnel Crack Segmentation Algorithm Based on Feature Enhancement by Lihua Feng, Aijun Yao, An Huang

    Published 2025-01-01
    “…However, due to the complex lighting conditions, background noise, and diverse nature of cracks inside tunnels, traditional image segmentation algorithms often struggle to achieve sufficient accuracy in crack segmentation tasks. …”
    Get full text
    Article
  6. 366

    On precise path planning algorithm in wireless sensor network by Farhanda Javed, Samiullah Khan, Asfandyar Khan, Alweena Javed, Rohi Tariq, Matiullah, Faheem Khan

    Published 2018-07-01
    “…The main problem is to design a path for a mobile landmark to maximize the location accuracy as well as to reduce energy consumption. Different path planning schemes have been proposed for localization. …”
    Get full text
    Article
  7. 367
  8. 368

    ROBO-ADVISORS AND AI-DRIVEN FUNDS: CATALYSTS IN THE DYNAMIC EVOLUTION OF ASSET MANAGEMENT by Amirul Ammar Anuar, Mohammad Taqiuddin Mohamad, Ahmad Azam Sulaiman @ Mohamad

    Published 2025-07-01
    “…Robo-advisors automate investor profiling and fund recommendations, whereas AI-driven funds use algorithms for autonomous trading decisions. AI adoption varies among asset management companies (AMCs), with differing levels of integration. …”
    Get full text
    Article
  9. 369

    Clustering and Detecting Network Intrusion Based on Fuzzy Algorithms by Manar Kashmola, Bayda Khaleel

    Published 2012-12-01
    “…These such items are more similar to each other within cluster, and difference than they are in the other clusters. Three fuzzy clustering algorithms (Fuzzy C-Means, Possibilistic C-Means and Gustafson-Kessel algorithms) were applied using kdd cup 99 data set to classify this data set  into 23 classes according to the subtype of attacks. …”
    Get full text
    Article
  10. 370

    Water Quality Prediction Using Artificial Intelligence Algorithms by Theyazn H. H Aldhyani, Mohammed Al-Yaari, Hasan Alkahtani, Mashael Maashi

    Published 2020-01-01
    “…In this work, advanced artificial intelligence (AI) algorithms are developed to predict water quality index (WQI) and water quality classification (WQC). …”
    Get full text
    Article
  11. 371

    Time Series measurements of White Blood Cells (WBC) and plasma Cancer Antigen 15-3 (CA 15-3) in a patient with metastatic breast cancer, serving as a reference for assessing the cl... by Alexandros CLOUVAS

    Published 2024-12-01
    “…In a recent study, the significance of the K-means clustering algorithm was examined for the first time in evaluating time-series measurements of plasma Cancer Antigen 15-3 (CA 15-3) in a male patient with metastatic breast cancer. …”
    Get full text
    Article
  12. 372
  13. 373

    Policy Evolution of Government Procurement of Public Services in China: A Text-Mining Perspective by Dongdan Zhu, Yuting Zhang, Zhengnan Lu

    Published 2023-01-01
    “…Secondly, the TF-IDF algorithm is adopted to obtain keywords at each stage, and the static stage characteristics are summarized by constructing the complex network of the extracted keywords. …”
    Get full text
    Article
  14. 374

    Cross-Domain Recommendation Algorithm Based on Latent Factor Model by Sheng Gao, Siting Ren, Jun Guo

    Published 2015-07-01
    “…In the internet environment,the combining of multi-source heterogeneous information objects in different areas makes users face information selection dilemma problem in big data environment.It has been very difficulty for traditional information recommendation algorithms to adapt to the interdisciplinary information recommendation service.The evaluation model from a user clustering set to an information object clustering set has common characteristics of cross-domain and personality characteristics of single domain.By analyzing the evaluation data from users to information objects in different areas,these characteristics were extracted based on latent factor model.Then by transmitting and sharing the common characteristics of cross-domain,the data sparseness problem of target field was alleviated,which could improve the accuracy of cross-domain information recommendation.…”
    Get full text
    Article
  15. 375

    The Morphological Classification of Galaxy Clusters: Algorithms for Applying the Numerical Criteria by Elena Panko

    Published 2025-07-01
    “…All algorithms are realized in the “Cluster Cartography” tool and can be used with data taken from different catalogs. …”
    Get full text
    Article
  16. 376

    Quantification and Evolution of Online Public Opinion Heat Considering Interactive Behavior and Emotional Conflict by Zhengyi Sun, Deyao Wang, Zhaohui Li

    Published 2025-06-01
    “…To address these issues, first, this study addressed the complexity of interaction behaviors by introducing an approach that employs the information gain ratio as a weighting indicator to measure the “interaction heat” contributed by different interaction attributes during event evolution. …”
    Get full text
    Article
  17. 377

    Advancing Engineering Solutions with Protozoa-Based Differential Evolution: A Hybrid Optimization Approach by Hussam N. Fakhouri, Faten Hamad, Abdelraouf Ishtaiwi, Amjad Hudaib, Niveen Halalsheh, Sandi N. Fakhouri

    Published 2025-03-01
    “…The performance of HPDE was evaluated on the CEC2014 benchmark functions, and it was compared against two sets of state-of-the-art optimizers comprising 23 different algorithms. …”
    Get full text
    Article
  18. 378

    Tuning and Comparison of Optimization Algorithms for the Next Best View Problematic by Everardo Shain-Ruvalcaba, Efrain Lopez-Damian

    Published 2024-01-01
    “…The aim of this paper is to tune and compare different optimization algorithms on the Next Best View (NBV) problem, which consists in finding the next position that the sensor or camera needs to take to scan an object or scenery in its totality. …”
    Get full text
    Article
  19. 379

    Quasiparticle Cooling Algorithms for Quantum Many-Body State Preparation by Jerome Lloyd, Alexios A. Michailidis, Xiao Mi, Vadim Smelyanskiy, Dmitry A. Abanin

    Published 2025-03-01
    “…In this work, we develop a kinetic-theory framework to describe quasiparticle cooling dynamics, and employ it to compare the efficiency of different cooling algorithms. In particular, we introduce a protocol where coupling to auxiliaries is modulated in time to minimize heating processes, and demonstrate that it allows a high-fidelity preparation of ground states in different quantum phases. …”
    Get full text
    Article
  20. 380