Search alternatives:
based function » based functional (Expand Search), basis function (Expand Search), basis functions (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithms _ (Expand Search)
b function » _ function (Expand Search), a function (Expand Search), 1 function (Expand Search)
based function » based functional (Expand Search), basis function (Expand Search), basis functions (Expand Search)
algorithm b » algorithm _ (Expand Search), algorithms _ (Expand Search)
b function » _ function (Expand Search), a function (Expand Search), 1 function (Expand Search)
-
141
-
142
(a): These systems were simulated for (0,3] and (0,3] without the prior knowledge about different phases, and the probability density function of points in feature space illustrate...
Published 2025“…<p>The points stretch from the dense region corresponding to the spin glass phase (left top) to the dense region corresponding to the ferromagnetic phase (right bottom), representing the mixed phase region. (b): The dense areas are separated by removing the data less than threshold = 0.5 in the probability density function. …”
-
143
-
144
-
145
-
146
Attack and defense behaviors with the sensory–motor algorithm between multiple predators and prey.
Published 2025Subjects: -
147
(a) Radar chart of these algorithms (23 Benchmark functions), (b) The sorting diagram of these algorithms (23 Benchmark functions).
Published 2025“…<p>(a) Radar chart of these algorithms (23 Benchmark functions), (b) The sorting diagram of these algorithms (23 Benchmark functions).…”
-
148
The optimal contact/quarantine rates from the family of functions (4) and (5) for Xi’an, Guangzhou and Yangzhou.
Published 2023“…(b, e, h) Root mean square error(), corresponding to fitting the time-dependent quarantine rate learned by TDINN algorithm using <i>q</i><sub>1</sub>(<i>t</i>), <i>q</i><sub>2</sub>(<i>t</i>) and <i>q</i><sub>3</sub>(<i>t</i>) in Xi’an, Guangzhou and Yangzhou. …”
-
149
<b>FCG-MFD: Benchmark Function Call Graph-Based Dataset for Malware Family Detection</b>
Published 2024“…Our approach to extracting semantic features via the Natural Language Processing (NLP) method is inspired by tasks involving sentences and words, respectively, for functions and instructions. We leverage a node2vec mechanism-based graph embedding network to generate malware embedding vectors. …”
-
150
-
151
-
152
-
153
-
154
-
155
-
156
-
157
-
158
An example of the algorithm of the ORFanID engine is explained in a UML flow chart diagram.
Published 2023Subjects: -
159
Box plot of the algorithms based on 12 benchmark functions.
Published 2023“…<p>Box plot of the algorithms based on 12 benchmark functions.</p>…”
-
160
Convergence behavior of the algorithms based on 12 benchmark functions.
Published 2023“…<p>Convergence behavior of the algorithms based on 12 benchmark functions.</p>…”