Search Results - evaluation algorithms
-
281
LE-YOLO: A Lightweight and Enhanced Algorithm for Detecting Surface Defects on Particleboard
Published 2025-07-01“…Current algorithms for surface defect detection in particleboard often encounter limitations such as high computational complexity and excessive parameter scale. …”
Get full text
Article -
282
Metro Station Passenger Volume Prediction Algorithm Based on Improved LSTNet Model
Published 2025-07-01Get full text
Article -
283
A machine learning algorithm to increase COVID-19 inpatient diagnostic capacity.
Published 2020-01-01“…Our aim was to develop and evaluate a machine learning algorithm to diagnose COVID-19 in the inpatient setting. …”
Get full text
Article -
284
Algorithm and software for the optimal technological design of a system of simple distillation columns
Published 2021-11-01“…The performance of the algorithm and software package has been evaluated using the optimal design of the debutanization column as an example.…”
Get full text
Article -
285
Secured Audio Framework Based on Chaotic-Steganography Algorithm for Internet of Things Systems
Published 2025-05-01“…Simulation results indicate that the OFDM system incorporating chaotic algorithm modes alongside steganography outperforms the chaotic algorithm alone, particularly at higher Eb/No values. …”
Get full text
Article -
286
Optimization of route distance using k-NN algorithm for on-demand food delivery
Published 2023-03-01Get full text
Article -
287
Improved Side-Channel Attack on CTR DRBG Using a Clustering Algorithm
Published 2025-07-01“…Experiments were conducted on an Atmel XMEGA128D4 processor to evaluate the effectiveness of the proposed attack method. …”
Get full text
Article -
288
Ultrasound thyroid nodule segmentation algorithm based on wavelet transform and CNN-Transformer
Published 2025-07-01Get full text
Article -
289
A Recruiting Maneuver Algorithm in Patients with Early Acute Respiratory Distress Syndrome
Published 2011-02-01Get full text
Article -
290
Robust Image Steganography Approach Based on Edge Detection Combined With CNN Algorithm
Published 2025-01-01“…., using the canny or sobel algorithm), and then the secret data is embedded inside the edge-detected cover image using a deep learning approach, and finally, the created stego image is sent to the receiver. …”
Get full text
Article -
291
An exercise prescription algorithm for clinicians to use with their patients with cardiovascular disease risk factors
Published 2025-07-01“…Prioritize Personalize Prescribe Exercise algorithm appears to be a potential solution to this problem.…”
Get full text
Article -
292
A Software Defined Network of Video Surveillance System Based on Enhanced Routing Algorithms
Published 2020-03-01“…In addition, different routing algorithms are used with different steps. First, we evaluate the video transmission over the SDN with Bellman Ford algorithm. …”
Get full text
Article -
293
Geometrical optimization of PWR spacer grids using GeN-Foam and Genetic Algorithms
Published 2025-05-01“…After GeN-Foam was assessed, optimization was performed on subchannels of a fuel assembly using Genetic Algorithms (GA), evaluating the influence of geometric parameters of the spacer grids to minimize pressure drop and maximize secondary flow. …”
Get full text
Article -
294
Exploring immune-inflammation markers in psoriasis prediction using advanced machine learning algorithms
Published 2025-07-01“…These markers are significant as reliable indicators for evaluating systemic inflammation and predicting the development of psoriasis, emphasizing their potential clinical applications.…”
Get full text
Article -
295
Implementation of fast algorithms for 2D flow simulation using vortex particle methods
Published 2025-04-01“…The general principles of fast algorithms were described. Their modifications for the problems mentioned above were discussed, and their efficiency was evaluated. …”
Get full text
Article -
296
Optimizing Crop Yield Prediction: An In-Depth Analysis of Outlier Detection Algorithms on Davangere Region
Published 2025-01-01“…Six prominent algorithms, including isolation forest, elliptic envelope, one-class SVM, iterative R, spatial singular value decomposition (SSVD), and spatial multiview outlier detection (SMVOD), are systematically evaluated. …”
Get full text
Article -
297
MONITORING AND CONTROL ALGORITHMS FOR PRODUCT POSITIONING STRATEGY: INSIGHTS FROM BULGARIA’S BANKING SECTOR
Published 2025-07-01“…The developed monitoring and control system (MCS) algorithm represents a decision-support tool for marketing managers in commercial banking, structured around the following components: (1) identification of key markers for evaluating and selecting appropriate product positioning strategies; (2) determination of reference values for these markers to facilitate systematic diagnosis of the implemented strategies’ effects; and (3) a methodology for corrective action contingent on observed deviations from the intended product positioning strategy …”
Get full text
Article -
298
Mitosis detection in histopathological images using customized deep learning and hybrid optimization algorithms.
Published 2025-01-01“…Furthermore, we have established an innovative selection mechanism by the hybrid of Jellyfish Search Optimizer (JSO) and Walrus Optimization Algorithm (WOA) to maximize the momentum of the model. …”
Get full text
Article -
299
Benchmarking Metaheuristic Algorithms Against Optimization Techniques for Transportation Problem in Supply Chain Management
Published 2025-06-01“…The research aims to explore the application of metaheuristic algorithms, with the Modified Distribution (MODI) method as the benchmark while employing the NorthWest Corner Method (NWCM) to obtain an initial feasible solution, to evaluate their performance in optimizing transportation problems. …”
Get full text
Article -
300
Impact of ISTA and FISTA iterative optimization algorithms on electrical impedance tomography image reconstruction
Published 2025-03-01“…It focuses on enhancing the convergence and accuracy of EIT image reconstruction by evaluating the effectiveness of these optimization algorithms when applied to regularized inverse problems, using standard regularization techniques. …”
Get full text
Article