بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
using algorithms » pacing algorithms (توسيع البحث), nine algorithms (توسيع البحث), sorting algorithms (توسيع البحث)
elements method » element method (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
using algorithms » pacing algorithms (توسيع البحث), nine algorithms (توسيع البحث), sorting algorithms (توسيع البحث)
elements method » element method (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
-
1
Multi-material topology optimization using scaled boundary finite element method
منشور في 2025"…SBFEM is implemented and its performance is tested across different density interpolation-based MMTO methods: the Alternating Active-Phase (AAP) algorithm, SIMP with mapping based interpolation, and polygonal mesh based MMTO, PolyMat which uses Discrete Material Optimization (DMO) combined with Zhang–Paulino–Ramos (ZPR) update scheme. …"
-
2
Algorithmic experimental parameter design.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
3
The FEM mesh model for the three-layer case, where 7919 degrees of freedom are used.
منشور في 2024الموضوعات: -
4
Spatial spectrum estimation for three algorithms.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
5
Element model generation method with geometric distribution errors
منشور في 2025"…The product surface geometric distribution error is directly attached to the element nodes of the product ideal element model using the error surface reconstruction method and the replacement algorithm of the element node vector height based on the product’s point cloud data. …"
-
6
-
7
Quadratic velocity elements.
منشور في 2025"…To enhance the precision of the proposed UB finite element method using a reduced element count, this study implements a mesh adaptation algorithm grounded in plastic dissipation. …"
-
8
Quadratic velocity elements.
منشور في 2025"…To enhance the precision of the proposed UB finite element method using a reduced element count, this study implements a mesh adaptation algorithm grounded in plastic dissipation. …"
-
9
-
10
-
11
-
12
-
13
Scatter diagram of different principal elements.
منشور في 2025"…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …"
-
14
-
15
The run time for each algorithm in seconds.
منشور في 2025"…These methods are tested on both real and synthetic data, with the former taken from a network of air quality monitoring stations across California. …"
-
16
-
17
-
18
List of the time used by each algorithm.
منشور في 2024"…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …"
-
19
Sanitized databases using MLHProtector algorithm.
منشور في 2025"…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …"
-
20