Showing 1,321 - 1,340 results of 1,530 for search 'generation optimization algorithm', query time: 0.24s Refine Results
  1. 1321

    Addressing Imbalanced Classification Problems in Drug Discovery and Development Using Random Forest, Support Vector Machine, AutoGluon-Tabular, and H2O AutoML by Ayush Garg (21090944)

    Published 2025
    “…To carry out our study, we have selected four such techniques(a) threshold optimization using (i) GHOST and (ii) the area under the precision–recall curve (AUPR) curve, (b) internal balancing method of AutoML and class-weight of machine learning methods, and (c) data balancing using SMOTETomekand generated 27 data sets considering nine different class ratios (i.e., the ratio of the positive class and total samples) from three data sets that belong to the drug discovery and development field. …”
  2. 1322
  3. 1323

    Synthetic Realness: Authenticity Collapse in the Age of AI by Reality Drift Working Papers Series 2020-2025 (22445446)

    Published 2025
    “…</p><p dir="ltr">This paper explores how curated, optimized, or AI-generated signals can feel more believable than lived experience: influencer vlogs that appear more “real” than daily life, AI chatbots that provide more comfort than human interaction, or polished corporate dashboards that feel truer than operational reality. …”
  4. 1324

    Fig 4 - by Michael S. Bradshaw (11772750)

    Published 2024
    “…Hyperparameters were tuned using a genetic optimization algorithm. Final trained models are evaluated on a held-out test set. …”
  5. 1325

    Accuracy and reliability of the fitted curves. by Ghazi Al-Rawas (16857943)

    Published 2025
    “…Then, this model was coupled with the Pareto Envelope-based Selection Algorithm-II (PESA-II) to identify the optimal channels’ characteristics and generate a range of non-dominated solutions that balance implementation costs, system resilience (measured by the Simple Urban Flood Resilience Index, SUFRI), and overflow. …”
  6. 1326

    Flowchart of the proposed framework. by Ghazi Al-Rawas (16857943)

    Published 2025
    “…Then, this model was coupled with the Pareto Envelope-based Selection Algorithm-II (PESA-II) to identify the optimal channels’ characteristics and generate a range of non-dominated solutions that balance implementation costs, system resilience (measured by the Simple Urban Flood Resilience Index, SUFRI), and overflow. …”
  7. 1327

    DeepInsight pipeline. by Jeseok Lee (21101255)

    Published 2025
    “…It creates representative images through dimension reduction and optimizes the images using the Convex Hull algorithm. …”
  8. 1328
  9. 1329

    The obtained scenarios of the wind speed by MCS. by Naima Agouzoul (21743513)

    Published 2025
    “…In this regard, a modified Dandelion Optimizer (MDO) algorithm is introduced to optimize the SORPD solution with taking into consideration the stochastic fluctuations or the random variations of the load demand and the power produced by RERs. …”
  10. 1330

    The obtained scenarios of the load by the MCS. by Naima Agouzoul (21743513)

    Published 2025
    “…In this regard, a modified Dandelion Optimizer (MDO) algorithm is introduced to optimize the SORPD solution with taking into consideration the stochastic fluctuations or the random variations of the load demand and the power produced by RERs. …”
  11. 1331

    Unraveling Adsorbate-Induced Structural Evolution of Iron Carbide Nanoparticles by Peter S. Rice (11805875)

    Published 2025
    “…For this purpose, we have developed a general procedure that we use to model an experimentally relevant 270-atom Fe<sub>182</sub>C<sub>88</sub> NP using the neural network-assisted stochastic surface walk global optimization algorithm (SSW-NN). Once generated, the Fe<sub>182</sub>C<sub>88</sub> NP active sites and particle morphology are thoroughly characterized before the effects of syngas adsorbate interactions are explored by using DFT and molecular dynamics simulations. …”
  12. 1332

    Comparison table of efficiency and safety. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  13. 1333

    Comparison table of authentication delay. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  14. 1334

    Comparison table of authentication delay. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  15. 1335

    Comparison of total communication costs. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  16. 1336

    Symbols and descriptions. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  17. 1337

    The AVISPA model diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  18. 1338

    FMM and multi-layer security strategy diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  19. 1339

    Continuous message window authentication diagram. by Zhanfei Ma (12506951)

    Published 2025
    “…Therefore, this paper proposes a lightweight authentication framework for Cloud-Edge-End, which integrates the enhanced Fast Authentication and Signature Trust for SM9 (FAST-SM9) algorithm and zero-trust Dynamic Re-authentication (zero-trust-DRA) mechanism. …”
  20. 1340

    BiLSTM model structure diagram [30]. by Yuye Zou (22806476)

    Published 2025
    “…The model employs a sophisticated three-phase methodology: (1) decomposition through Variational Mode Decomposition (VMD) to extract multiple intrinsic mode functions (IMFs) from the original time series, effectively capturing its nonlinear and complex patterns; (2) optimization using a Chaotic Particle Swarm Optimization (CPSO) algorithm to fine-tune the Bi-directional Long Short-Term Memory (BiLSTM) network parameters, thereby improving both predictive accuracy and model stability; and (3) integration of predictions from both high-frequency and low-frequency components to generate comprehensive final forecasts. …”