Search alternatives:
experiments using » experiments show (Expand Search), experimental testing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
element based » engagement based (Expand Search)
experiments using » experiments show (Expand Search), experimental testing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
element based » engagement based (Expand Search)
-
1
-
2
-
3
Convergence curve of the DBO algorithm.
Published 2025“…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
-
4
-
5
-
6
-
7
Mitochondrial toxic prediction of marine alga toxins using a predictive model based on feature coupling and ensemble learning algorithms
Published 2025“…By comparing 8 machine learning algorithms and using a weighted soft voting method to integrate the two optimal algorithms, we established 108 prediction models and identified the best ensemble learning model MACCS_LK for screening and defining its application domain. …”
-
8
Hyperparameters of self-supervised learning algorithms used in Experiments 1–5.
Published 2024“…<p>Hyperparameters of self-supervised learning algorithms used in Experiments 1–5.</p>…”
-
9
-
10
-
11
State and action space sizes of the robots in the experiment and the corresponding parameters of the algorithms used.
Published 2025“…<p>State and action space sizes of the robots in the experiment and the corresponding parameters of the algorithms used.…”
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
Sanitized databases using MLHProtector algorithm.
Published 2025“…Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.…”
-
20