بدائل البحث:
based function » based functional (توسيع البحث), basis function (توسيع البحث), basis functions (توسيع البحث)
value function » rate function (توسيع البحث), wave function (توسيع البحث)
algorithm both » algorithm blood (توسيع البحث), algorithm b (توسيع البحث), algorithm etc (توسيع البحث)
both function » body function (توسيع البحث), growth function (توسيع البحث), beach function (توسيع البحث)
based function » based functional (توسيع البحث), basis function (توسيع البحث), basis functions (توسيع البحث)
value function » rate function (توسيع البحث), wave function (توسيع البحث)
algorithm both » algorithm blood (توسيع البحث), algorithm b (توسيع البحث), algorithm etc (توسيع البحث)
both function » body function (توسيع البحث), growth function (توسيع البحث), beach function (توسيع البحث)
-
1
Completion times for different algorithms.
منشور في 2025"…Action masking is used to filter out invalid states and actions, while a shared reward mechanism is adopted to balance cooperation efficiency among agents. Additionally, value function normalization and adaptive learning rate strategies are applied to accelerate convergence. …"
-
2
The average cumulative reward of algorithms.
منشور في 2025"…Action masking is used to filter out invalid states and actions, while a shared reward mechanism is adopted to balance cooperation efficiency among agents. Additionally, value function normalization and adaptive learning rate strategies are applied to accelerate convergence. …"
-
3
Simulation settings of rMAPPO algorithm.
منشور في 2025"…Action masking is used to filter out invalid states and actions, while a shared reward mechanism is adopted to balance cooperation efficiency among agents. Additionally, value function normalization and adaptive learning rate strategies are applied to accelerate convergence. …"
-
4
Power consumption for SHA256 software algorithm.
منشور في 2023"…A specific (dedicated) circuit is designed to implement the compression technique, generate the blockchain hash values and data encryption. The compression algorithm is based on chaotic theory. …"
-
5
-
6
-
7
-
8
-
9
-
10
Candidate networks attribute values.
منشور في 2023"…Lastly, the desired aims are formulated as an objective function, then the PSOGSA algorithm is used to reach the optimal values of both LF and SP, which will be considered when executing the handover algorithm. …"
-
11
RI value according to the number of attributes.
منشور في 2023"…Lastly, the desired aims are formulated as an objective function, then the PSOGSA algorithm is used to reach the optimal values of both LF and SP, which will be considered when executing the handover algorithm. …"
-
12
Attribute values at a single moment.
منشور في 2023"…Lastly, the desired aims are formulated as an objective function, then the PSOGSA algorithm is used to reach the optimal values of both LF and SP, which will be considered when executing the handover algorithm. …"
-
13
-
14
Fitness function curve at weight factor 0.3.
منشور في 2024"…GA is employed to identify machine cells and part families based on Grouping Efficiency (GE) as a fitness function. …"
-
15
-
16
-
17
DE genes detected by different DEA algorithms.
منشور في 2024"…Here, we compare 6 performance metrics on both simulated and real scRNA-seq datasets to assess the adaptability of 8 DEA approaches, with a particular emphasis on how well they function under small biological replications. …"
-
18
-
19
-
20