Showing 1 - 20 results of 5,037 for search '(((( implement based algorithm ) OR ( elements _ algorithm ))) OR ( level using algorithm ))', query time: 0.48s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Biological Function Assignment across Taxonomic Levels in Mass-Spectrometry-Based Metaproteomics via a Modified Expectation Maximization Algorithm by Gelio Alves (51850)

    Published 2025
    “…To overcome this limitation, we implemented an expectation-maximization (EM) algorithm, along with a biological function database, within the MiCId workflow. …”
  7. 7

    Power quality control algorithms for small scale power intergration systems by Advocate Mlamla (20170815)

    Published 2024
    “…The use of small-scale solar PV for the support of the DC-link storage element used in the CPDs is explored.…”
  8. 8

    Convergence curve of the DBO algorithm. by Ma Haohao (22177538)

    Published 2025
    “…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
  9. 9

    Contrast enhancement of digital images using dragonfly algorithm by Soumyajit Saha (19726163)

    Published 2024
    “…The article deals with contrast enhancement as an optimization problem and uses the Dragonfly Algorithm (DA) to find the optimal grey-level intensity values. …”
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Technological Fitness and Coherence explanation. Schematic representation of the workings of the Fitness and Complexity algorithm and Coherence diversification. by Matteo Straccamore (15083799)

    Published 2025
    “…<p>In the top panel, we show the computation of the Fitness and Complexity algorithm. The Fitness of the entity <i>e</i><sub>1</sub> is the technological Complexity sum of all the technology done by <i>e</i><sub>1</sub>. …”
  15. 15
  16. 16

    Sanitized databases using MLHProtector algorithm. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
  17. 17
  18. 18
  19. 19
  20. 20