Showing 3,841 - 3,860 results of 6,037 for search 'main algorithm', query time: 0.15s Refine Results
  1. 3841

    Research on leaf identification of table grape varieties based on deep learning by PAN Bowen, LIN Meiling, JU Yanlun, SU Baofeng, SUN Lei, FAN Xiucai, ZHANG Ying, ZHANG Yonghui, LIU Chonghuai, JIANG Jianfu, FANG Yulin

    Published 2025-08-01
    “…[Conclusion] The ResNet-101 model had the highest overall recognition accuracy, the lowest LOSS value, the higher average recognition accuracy and Recall rate of varieties, and could get a better model with fewer iterations, which would take less time. The Grad-CAM algorithm was used to evaluate the classification effect of four convolutional neural networks, and all of them could accurately identify the main features of the leaves. …”
    Get full text
    Article
  2. 3842

    Optimizing ensemble learning for satellite-based multi-hazard monitoring and susceptibility assessment of landslides, land subsidence, floods, and wildfires by Seyed Vahid Razavi-Termeh, Abolghasem Sadeghi-Niaraki, Farman Ali, Biswajeet Pradhan, Soo-Mi Choi

    Published 2025-08-01
    “…To address this gap, this study uses two meta-heuristic algorithms (Genetic Algorithm (GA) and Particle Swarm Optimization (PSO)) to provide an optimized Random Forest (RF) model with better predictive ability. …”
    Get full text
    Article
  3. 3843

    Identifying and mapping open-boll cotton fields in the southeastern United States with time series PhenoCam, Sentinel-2 and Sentinel-1 images by Fang Liu, Xiangming Xiao, Yuanwei Qin, Luo Liu

    Published 2025-08-01
    “…The color-based algorithm performed well in multiple years and different regions, demonstrating the algorithm’s robustness and potential for regional application. …”
    Get full text
    Article
  4. 3844

    Application of Intelligent Archives Management Based on Data Mining in Hospital Archives Management by Juan Li

    Published 2022-01-01
    “…The information excavated must be real and not universally known, and it can be the discovery of a specific problem. Data mining algorithms mainly include the neural network method, decision tree method, genetic algorithm, rough set method, fuzzy set method, association rule method, and so on. …”
    Get full text
    Article
  5. 3845

    Comparison and general law research of multiple machine-learning models for proton exchange membrane electrolytic cell parameters prediction by Yukun Wang, Hai-Wen Li, Wenhan An, Yudong Mao, Kaimin Yang, Jiying Liu

    Published 2025-05-01
    “…The obtained results show that voltage, membrane thickness and inlet water temperature mainly affect three performance evaluation indicators. …”
    Get full text
    Article
  6. 3846

    New contextual collaborative filtering system with application to personalized healthy nutrition education by Hanane Zitouni, Souham Meshoul, Chaker Mezioud

    Published 2022-04-01
    “…Its highest layer relies on a pre-filtering algorithm that deals with the cold start system problem, and is mainly based on the similarity between the user profile and the items features. …”
    Get full text
    Article
  7. 3847

    A clustering-aided multi-agent deep reinforcement learning for multi-objective parallel batch processing machines scheduling in semiconductor manufacturing by Peng Zhang, Mengyu Jin, Ming Wang, Jie Zhang, Junjie He, Peng Zheng

    Published 2025-05-01
    “…Pioneer researches on multi-objective batch machines scheduling mainly focus on evolutionary algorithms, failing to meet the online scheduling demand. …”
    Get full text
    Article
  8. 3848

    Prediction of Traffic Flow considering Electric Vehicle Market Share and Random Charging by Yunjuan Yan, Weixiong Zha, Jungang Shi, Liping Yan

    Published 2023-01-01
    “…In order to analyze the random charging and path choice behaviors of BEV users and extract the differences in travel behaviors between BEV and GV users, an improved logit-based model, multilabel algorithm, and queuing theory are applied. The influencing factors of charging possibility mainly include the initial state of charge (SOC), the SOC at the beginning of charging, and the psychologically acceptable safe SOC threshold arriving at the destination. …”
    Get full text
    Article
  9. 3849

    YOLOv8 vs RetinaNet vs EfficientDet: A Comparative Analysis for Modern Object Detection by Sana Fatima, Najmi Ghani Haider, Rizwan Riaz

    Published 2025-02-01
    “…We compare these three algorithms using the COCO dataset, which mainly comprises three categories of data, which are discussed in this paper. …”
    Get full text
    Article
  10. 3850

    A Coal Mine Excavation Tunnels Modeling Method Based on Point Clouds by Haoyuan Zhang, Shanjun Mao, Mei Li

    Published 2024-10-01
    “…Currently, tunnel models are mainly created manually, and point cloud reconstruction algorithms are difficult to directly apply to tunnel point clouds. …”
    Get full text
    Article
  11. 3851

    Research on cross-domain trustable blockchain based decentralized DNS architecture by Kai LEI, Fangxing SHU, Lei HUANG, Qichao ZHANG

    Published 2020-04-01
    “…The domain name system (DNS) is an important internet infrastructure.However,current DNS utilizes centralized hierarchical structure with severe dependence on root server,which causes defects such as the risk of single-point failure and the abuse of central rights.Designing new decentralized DNS mainly focuses on transforming the domain name system from a single trust domain which relies on the center to multiple trust domains with the top-level domain name as the root parallel to each other,but also faces cross-domain credible challenges.To design a cross-domain trusted architecture,the concept of separating control and analysis was adopted,and a dual-blockchain DNS architecture was proposed.At data layer,a novel cross-domain verification was designed based on a one-way accumulator verification scheme,with the time complexity of the verification process O(N) reducing to O(1) nearly.The CDBFT algorithm was proposed by combining the DPoS mechanism and the BFT algorithm,whose average throughput reaches 736 TPS.The theoretical derivation and experimental results have demonstrated the advantages of this new DNS architecture on security,performance,and scalability.…”
    Get full text
    Article
  12. 3852

    Wearable Device Monitoring Exercise Energy Consumption Based on Internet of Things by Xiaomei Shi, Zhihua Huang

    Published 2021-01-01
    “…The corresponding core algorithm is the step counting algorithm, which can accurately calculate the relationship between human motion and the corresponding energy consumption and feed back to the intelligent device. …”
    Get full text
    Article
  13. 3853

    College English Audio-Visual-Oral Teaching Mode from the Perspective of Artificial Intelligence by Li Ling

    Published 2022-01-01
    “…Experiments show that this model achieves better teaching quality than the models constructed by traditional GA algorithm and BSA algorithm and is more suitable for promotion in college English teaching.…”
    Get full text
    Article
  14. 3854

    Learning properties of quantum states without the IID assumption by Omar Fawzi, Richard Kueng, Damian Markham, Aadil Oufkir

    Published 2024-11-01
    “…Importantly, this polynomial increase in sample complexity can be substantially improved to polylogarithmic if the learning algorithm in question only requires non-adaptive, single-copy measurements. …”
    Get full text
    Article
  15. 3855

    Simulation Research on Active Noise Reduction in Driver’s Cab ofAutonomous-rail Rapid Tram by ZHOU Sheng, HUANG Wanjun, LI Wei, XIAO Lei, HUANG Jin, HE Jie

    Published 2021-01-01
    “…Noise of autonomous-rail rapid tram mainly comes from giant mechanical and electrical equipment installed on the chassis of cab. …”
    Get full text
    Article
  16. 3856

    Can vegetation breakpoints in Eastern Mongolia rangeland be detected using Sentinel-1 coherence time series data? by Shuxin Ji, Ganzorig Gonchigsumlaa, Sugar Damdindorj, Tserendavaa Tseren, Densmaa Sharavjamts, Amartuvshin Otgondemberel, Enkh-Amgalan Gurjav, Munguntsetseg Puntsagsuren, Batnaran Tsabatshir, Tumendemberel Gungaa, Narantsetseg Batbold, Lukas Drees, Bayarchimeg Ganbayar, Dulamragchaa Orosoo, Bayartsetseg Lkhamsuren, Badamtsetseg Ganbat, Myagmarsuren Damdinsuren, Gantogoo Gombosuren, Batnyambuu Dashpurev, Thanh Noi Phan, Nandintsetseg Dejid, Thomas Müller, Lukas Lehnert

    Published 2025-12-01
    “…To detect movement patterns, a new random forest-based method to detect breakpoints in vegetation condition has been developed and compared to the widely used Breaks For Additive Season and Trend (BFAST) algorithm. In contrast to BFAST, the new method accounts for vegetation changes caused by weather events such as snow and rainfall. …”
    Get full text
    Article
  17. 3857

    Spatial Vibration Characteristics and Damage Identification of Toppling Dangerous Rock Mass by Chen ZHAO, Mowen XIE, Yan DU, Zhengjun HUANG, Zheng HE, Guang LU

    Published 2024-09-01
    “…The sensitivity of different directions to the main frequency is much smaller than <italic>X</italic> and <italic>Z</italic>-directions. …”
    Get full text
    Article
  18. 3858

    Effect of Voltage Dependent Load Model on Placement and Sizing of Distributed Generator in Large Scale Distribution System by Gopisetti Manikanta, Ashish Mani, Hemender Pal Singh, Devendra Kumar Chaturvedi

    Published 2024-02-01
    “…In addition to AQiEA, four other algorithms (Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), Grey Wolf Optimization (GWO), and Ecogeography-based Optimization (EBO) with Classification based on Multiple Association Rules (CMAR)) have also been employed for comparison. …”
    Get full text
    Article
  19. 3859

    Sustainability index for eco-friendly cattle farming in dry climate regions by T. Simamora, M.N. Rofiq, L. Hutahaean, S. Sio, R. Hutapea, D. Irawan, Suryani ., R. Diastuti, U.N. Thiyas, B.A. Correia, L.T. Correia

    Published 2024-11-01
    “…Attributes in the legal and institutional dimensions are the main factors supporting beef cattle's sustainability. …”
    Get full text
    Article
  20. 3860

    Spectrum Efficient Resource Allocation of NOMA Downlink System With MMSE Receiver by Rui Zhu, Jianxin Guo, Feng Wang, Baoqin Lin, Yarong Chen

    Published 2023-01-01
    “…However, since the effective SIC usually requires complex algorithm and leads to higher processing delay, it may not be accepted by the B5G wireless communication due to the limited hardware resource of the mobile terminal and strict real-time request of service. …”
    Get full text
    Article