Search alternatives:
content algorithm » consistent algorithm (Expand Search), control algorithm (Expand Search), monte algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
complement rl » complement _ (Expand Search), complement 5a (Expand Search), complement c3 (Expand Search)
rl algorithm » rl algorithms (Expand Search), rf algorithm (Expand Search), ml algorithms (Expand Search)
level coding » level according (Expand Search), level modeling (Expand Search), level using (Expand Search)
content algorithm » consistent algorithm (Expand Search), control algorithm (Expand Search), monte algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
complement rl » complement _ (Expand Search), complement 5a (Expand Search), complement c3 (Expand Search)
rl algorithm » rl algorithms (Expand Search), rf algorithm (Expand Search), ml algorithms (Expand Search)
level coding » level according (Expand Search), level modeling (Expand Search), level using (Expand Search)
-
41
-
42
-
43
-
44
-
45
<b>Codes for "Fatigue analysis of wind turbine and load reduction through wind-farm-level yaw control"</b>
Published 2024“…<p dir="ltr">The farm-level yaw control optimization algorithm Codes for "Fatigue analysis of wind turbine and load reduction through wind-farm-level yaw control"</p>…”
-
46
-
47
-
48
-
49
-
50
Code snippet from “Netty/Buffer” Maven artefact.
Published 2025“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
-
51
-
52
Model code
Published 2025“…The latter provides insights into the inherent texture complexity of the image data due to the lossless coding. For classification of leaf surfaces from tree species based on the computed features, we utilized the k-nearest neighbors (kNN) algorithm with k=3. …”
-
53
-
54
Data Sheet 1_Strategies for population-level identification of post-acute sequelae of COVID-19 through health administrative data.pdf
Published 2025“…From each included study, we extracted data on design, algorithms used for outcome identification (sources, coding systems, codes, time criteria/thresholds), and whether significant associations with SARS-CoV-2 infection were reported.…”
-
55
Code snippet from “Apache Dubbo” GitHub project.
Published 2025“…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …”
-
56
Mechanomics Code - JVT
Published 2025“…At the beginning of the code, there is a help section that explains how to use it.…”
-
57
Visualization of algorithm detection results.
Published 2025“…On the KITTI dataset, our algorithm achieved 3D average detection accuracy (AP3D) of 81.15%, 62.02%, and 58.68% across three difficulty levels. …”
-
58
-
59
-
60