Search alternatives:
using algorithms » pacing algorithms (Expand Search), nine algorithms (Expand Search), sorting algorithms (Expand Search)
element finding » element bonding (Expand Search), recent finding (Expand Search), present findings (Expand Search)
using algorithm » routing algorithm (Expand Search), fusion algorithm (Expand Search), making algorithm (Expand Search)
elements using » elements during (Expand Search), movements using (Expand Search), events using (Expand Search)
using algorithms » pacing algorithms (Expand Search), nine algorithms (Expand Search), sorting algorithms (Expand Search)
element finding » element bonding (Expand Search), recent finding (Expand Search), present findings (Expand Search)
using algorithm » routing algorithm (Expand Search), fusion algorithm (Expand Search), making algorithm (Expand Search)
elements using » elements during (Expand Search), movements using (Expand Search), events using (Expand Search)
-
1
-
2
-
3
-
4
The run time for each algorithm in seconds.
Published 2025“…We find evidence that the generalised GLS-KGR algorithm is well-suited to such time-series applications, outperforming several standard techniques on this dataset.…”
-
5
Algorithmic experimental parameter design.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
6
-
7
Spatial spectrum estimation for three algorithms.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
8
-
9
Comparison of different optimization algorithms.
Published 2025Subjects: “…crayfish optimization algorithm…”
-
10
-
11
-
12
-
13
-
14
Risk element category diagram.
Published 2025“…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …”
-
15
-
16
-
17
-
18
-
19
Determination of cyclic behavior of various cross-section composite column-beam connections reinforced with FRP composite using FEM analysis and ML models
Published 2025“…Mean learning (XGBoost and the random forest algorithm) and numerical methods were used to identify the data collected experimentally due to the rotation behavior. …”
-
20