بدائل البحث:
components algorithm » component algorithm (توسيع البحث)
complex components » core components (توسيع البحث)
update algorithm » pass algorithm (توسيع البحث), data algorithms (توسيع البحث), ipca algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
element update » element data (توسيع البحث)
components algorithm » component algorithm (توسيع البحث)
complex components » core components (توسيع البحث)
update algorithm » pass algorithm (توسيع البحث), data algorithms (توسيع البحث), ipca algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
element update » element data (توسيع البحث)
-
1
-
2
-
3
The material characteristics of the components.
منشور في 2025"…<div><p>The convergence of algorithms is an unavoidable problem when using global optimization algorithms to optimize acoustic properties of metamaterials. …"
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
Overview of the Cell2Spatial algorithm.
منشور في 2025"…SC and spatial transcriptomics (ST) data were standardized using <i>SCTransform</i> in Seurat, with cell-type-specific genes identified through a modified entropy-based method (Step 1). …"
-
14
-
15
-
16
Informer component details.
منشور في 2025"…First, the Lasso algorithm and Pearson correlation coefficient method are applied to screen key multi-source features from wind turbine operation and maintenance data, quantifying their dynamic correlations with power output. …"
-
17
-
18
Updated results of parameters (posterior means identified from experimental modal data).
منشور في 2025الموضوعات: -
19
Data Sheet 1_IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic.docx
منشور في 2025"…On the AWID dataset, IGSA-SAC surpasses 98.9% in both accuracy and F1-score, outperforming existing intrusion detection algorithms.</p>Conclusions<p>The proposed IGSA-SAC method significantly improves intrusion detection performance by effectively handling high-dimensional datasets and reducing computational complexity. …"
-
20
Comparison of experimental results of information entropy using different methods.
منشور في 2025الموضوعات: