Showing 161 - 180 results of 12,690 for search '(((( algorithm based function ) OR ( algorithm b function ))) OR ( algorithm python function ))', query time: 0.66s Refine Results
  1. 161

    BOFdat Step 3: Identifying species-specific metabolic end goals. by Jean-Christophe Lachance (6619307)

    Published 2019
    “…(C) Schematic representation of the implementation of the genetic algorithm (GA) using the metabolic network presented in B. …”
  2. 162

    (a): These systems were simulated for (0,3] and (0,3] without the prior knowledge about different phases, and the probability density function of points in feature space illustrate... by Ali Talebi (7164203)

    Published 2025
    “…<p>The points stretch from the dense region corresponding to the spin glass phase (left top) to the dense region corresponding to the ferromagnetic phase (right bottom), representing the mixed phase region. (b): The dense areas are separated by removing the data less than threshold = 0.5 in the probability density function. …”
  3. 163
  4. 164
  5. 165
  6. 166
  7. 167

    (a) Radar chart of these algorithms (23 Benchmark functions), (b) The sorting diagram of these algorithms (23 Benchmark functions). by Yu Liu (6938)

    Published 2025
    “…<p>(a) Radar chart of these algorithms (23 Benchmark functions), (b) The sorting diagram of these algorithms (23 Benchmark functions).…”
  8. 168

    The optimal contact/quarantine rates from the family of functions (4) and (5) for Xi’an, Guangzhou and Yangzhou. by Mengqi He (5753525)

    Published 2023
    “…(b, e, h) Root mean square error(), corresponding to fitting the time-dependent quarantine rate learned by TDINN algorithm using <i>q</i><sub>1</sub>(<i>t</i>), <i>q</i><sub>2</sub>(<i>t</i>) and <i>q</i><sub>3</sub>(<i>t</i>) in Xi’an, Guangzhou and Yangzhou. …”
  9. 169

    <b>FCG-MFD: Benchmark Function Call Graph-Based Dataset for Malware Family Detection</b> by Hassan jalil hadi (18243805)

    Published 2024
    “…Our approach to extracting semantic features via the Natural Language Processing (NLP) method is inspired by tasks involving sentences and words, respectively, for functions and instructions. We leverage a node2vec mechanism-based graph embedding network to generate malware embedding vectors. …”
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178
  19. 179
  20. 180