بدائل البحث:
codingnb algorithm » cosine algorithm (توسيع البحث)
experiments using » experiments show (توسيع البحث), experimental testing (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
neural codingnb » neural coding (توسيع البحث)
g algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), gnb algorithm (توسيع البحث)
element g » element _ (توسيع البحث), elements _ (توسيع البحث)
codingnb algorithm » cosine algorithm (توسيع البحث)
experiments using » experiments show (توسيع البحث), experimental testing (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
neural codingnb » neural coding (توسيع البحث)
g algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), gnb algorithm (توسيع البحث)
element g » element _ (توسيع البحث), elements _ (توسيع البحث)
-
1
Convergence curve of the DBO algorithm.
منشور في 2025"…The material removal model based on Preston’s theory was studied, and the factors of polishing pressure, tool speed, feed speed, and sandpaper type were considered to design the manual polishing experiment. The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …"
-
2
-
3
-
4
Hyperparameters of self-supervised learning algorithms used in Experiments 1–5.
منشور في 2024"…<p>Hyperparameters of self-supervised learning algorithms used in Experiments 1–5.</p>…"
-
5
-
6
State and action space sizes of the robots in the experiment and the corresponding parameters of the algorithms used.
منشور في 2025"…<p>State and action space sizes of the robots in the experiment and the corresponding parameters of the algorithms used.…"
-
7
-
8
-
9
-
10
-
11
-
12
-
13
Sanitized databases using MLHProtector algorithm.
منشور في 2025"…Empirical experiments showed that both algorithms successfully protect the itemsets from being compromised by attackers.…"
-
14
-
15
-
16
-
17
-
18
-
19
-
20