Search Results - evaluation algorithms

  1. 161

    Improved Firefly Algorithm with Variable Neighborhood Search for Data Clustering by Hayder Naser Khraibet Al-Behadili

    Published 2022-04-01
    “…The comparison according to the internal and external evaluation metrics indicates that the proposed FA-VNS can produce more compact clustering solutions than the well-known clustering algorithms. …”
    Get full text
    Article
  2. 162

    Nighttime Vehicle Detection Algorithm Based on Improved YOLOv7 by Fan Zhang

    Published 2025-01-01
    “…The Soft-EloU-NMS post-processing algorithm is further proposed to effectively reduce the leakage detection rate of dense small targets by fusing the multi-dimensional evaluation of overlap, center distance and aspect ratio. …”
    Get full text
    Article
  3. 163

    Fault Diagnosis of Power Equipment Based on Improved SVM Algorithm by Youle Song, Yuting Duan, Tong Rao

    Published 2025-07-01
    “…Therefore, this study proposes an improved support vector machine model, combined with grey wolf optimization algorithm, aimed at improving the accuracy and efficiency of power equipment fault diagnosis. …”
    Get full text
    Article
  4. 164
  5. 165

    Mathematical Formalization and Algorithmization of the Main Modules of Organizational and Technical Systems by A. A. Solodov

    Published 2020-09-01
    “…In this regard, the key aspect of the work is to study the optimal algorithms for evaluating the state of processes occurring in the organizational and technical systems and develop on this basis the principles of mathematical formalization and algorithmization of the status assessment module. …”
    Get full text
    Article
  6. 166

    Analyzing cryptographic algorithm efficiency with in graph-based encryption models by Yashmin Banu, Biplab Kumar Rath, Debasis Gountia

    Published 2025-07-01
    “…In this study, we analyze the performance of RSA and ElGamal cryptographic algorithms by evaluating time and space complexity across various file types, including text, image, audio, and data of different sizes. …”
    Get full text
    Article
  7. 167

    Use of lightweight FFT-based algorithms for remote measurements using DIC by Slávek Zbirovský, Václav Nežerka

    Published 2023-07-01
    “…The software was developed in Python, allowing for two modes: the online mode for current data evaluation with information transfer via the MQTT protocol and the offline mode used for retrospective evaluation. …”
    Get full text
    Article
  8. 168

    Applying of Kutter-Jordan-Bossen steganography algorithm to video sequences by N. V. Lysenko, G. M. Labkov

    Published 2015-08-01
    “…The influence of different types of noise on the algorithm stability is evaluated. It is shown that the resistance to noise interferences can be improved by increasing the number of embedding one bit, however, this increases the probability of detection of hidden information is not an authorized user.…”
    Get full text
    Article
  9. 169

    Information Encryption Algorithm Using a Discrete Quantum Map by A. V. Sidorenko, E. A. Vysotskaya

    Published 2025-07-01
    “…To evaluate the performance of the algorithm, testing was carried out on three encrypted images that differed in the volume of transmitted information. …”
    Get full text
    Article
  10. 170

    INVESTIGATION OF KROHN’S ALGORITHM AND ITS MODIFICATION FOR VARIOUS BASIC DATA by Valery Grigoryevich Kobak, Dmitry Vyacheslavovich Titov, Oleg Anatolyevich Zolotykh

    Published 2012-12-01
    “…The output values of a number of computational experiments at various input parameters are given in the paper for estimating the efficiency of the obtained Krohn’s algorithm modifications. The modified algorithms efficiency has been evaluated by the operate time and by the departure of the obtained load values from the optimum. …”
    Get full text
    Article
  11. 171

    Improved Image Compression Scheme Using Hybrid Encoding Algorithm by Yusra Ahmed Salih, Aree Ali Mohammed, Loay Edwar George

    Published 2019-10-01
    “…The performance of the proposed scheme is evaluated by using different metrics such as (PSNR, compression ratio and encoding time). …”
    Get full text
    Article
  12. 172

    THE MODIFIED MARINE PREDATOR ALGORITHM FOR SOLVING OPTIMIZATION PROBLEMS (MMPA) by Nisreen Al Barrak, Hegazy Zaher, Naglaa Ragaa Saeid, Eman Oun

    Published 2025-05-01
    “…The Modified Marine Predators Algorithm was evaluated on 23 benchmark functions, encompassing unimodal, multimodal, and composite landscapes, to assess its efficiency and robustness. …”
    Get full text
    Article
  13. 173

    Implications of algorithmic bias in AI-driven emergency response systems by Katsiaryna Bahamazava

    Published 2026-01-01
    “…In this paper, we introduce a framework to evaluate the economic implications of algorithmic bias specifically for the emergency response systems that incorporate AI. …”
    Get full text
    Article
  14. 174

    SEARCH ALGORITHM FOR THE PARAMETRIC IDENTIFICATION OF THE ELECTRIC DRIVE OF THE MONITORING SYSTEM by A. S. Abufanas, A. A. Lobaty, A. G. Shvedko

    Published 2017-08-01
    “…A general structural diagram of the parametric identification search system with a gradient algorithm is presented.As an example for evaluating the operability of the proposed algorithm, we consider the simplest model of an electric drive, given by a transfer function in the form of an inertial link. …”
    Get full text
    Article
  15. 175

    IMAGE ENCRYPTION ALGORITHM USING TWO-DIMENSIONAL CHAOTIC MAPS by A. V. Sidorenko, I. V. Shakinko, Yu. V. Sidorenko

    Published 2016-07-01
    “…The algorithm key sensitivity has been evaluated. Besides, the values of the unified average change intensity (UACI) and the ratios of differing bits to the total number of bits have been determined. …”
    Get full text
    Article
  16. 176

    Purchasing Prediction Using Machine Learning Algorithms for Optimizing Inventory Management by Reza Hamdi Prayetno, Rani Destika Purba, Kyrene Wirawan, Kelvin Sweet, Evta Indra

    Published 2025-03-01
    “…By analyzing sales data for 2023 which consists of 96,630 lines, the research applies systematic stages: data acquisition, preprocessing, exploratory data analysis, model building, and evaluation. The LSTM method is used to predict spare parts stock with significant accuracy, demonstrated through evaluation metrics: Mean Absolute Error (MAE) 12%, Mean Squared Error (MSE) 2%, and Root Mean Square Error (RMSE) 15%. …”
    Get full text
    Article
  17. 177
  18. 178

    Forensic Genetics: A Machine Learning Algorithm for Mutation Modelling by Sofia Antão Sousa, Leonor Gusmão, Marisa Faustino, António Amorim, Nádia Pinto

    Published 2025-06-01
    “…These results support that machine learning algorithms may be used to improve mutation modelling, statistical significance depending on the available data to be used as training and test sets. …”
    Get full text
    Article
  19. 179
  20. 180

    Using Machine Learning Algorithms in Intrusion Detection Systems: A Review by Mazin S. Mohammed, Hasanien Ali Talib

    Published 2024-06-01
    “…Notable algorithms, including decision trees, random forests, support vector machines, and deep learning architectures, are discussed. …”
    Get full text
    Article