Search alternatives:
using function » using functional (Expand Search), sine function (Expand Search), waning function (Expand Search)
flow function » from function (Expand Search), low functional (Expand Search), loss function (Expand Search)
algorithm a » algorithm _ (Expand Search), algorithm b (Expand Search), algorithms _ (Expand Search)
a function » _ function (Expand Search)
using function » using functional (Expand Search), sine function (Expand Search), waning function (Expand Search)
flow function » from function (Expand Search), low functional (Expand Search), loss function (Expand Search)
algorithm a » algorithm _ (Expand Search), algorithm b (Expand Search), algorithms _ (Expand Search)
a function » _ function (Expand Search)
-
1
-
2
DE algorithm flow.
Published 2025“…<div><p>To solve the problems of insufficient global optimization ability and easy loss of population diversity in building interior layout design, this study proposes a novel layout optimization model integrating interactive genetic algorithm and improved differential evolutionary algorithm to improve the global optimization ability and maintain population diversity in building layout design. …”
-
3
-
4
-
5
Training algorithm flow.
Published 2024“…<div><p>In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
-
6
-
7
Algorithm Parameter Setting.
Published 2025“…This strategy uses the improved D3QN algorithm combined with the excellent smoothness of the sine function to evaluate driving safety, helping vehicles find suitable gaps in traffic flow. …”
-
8
-
9
Comparison of deconvolution and optimization algorithms on a batch of data.
Published 2021“…Both experimental data have been resampled at 50ms and used to compute a set of TFs (in orange) either with direct deconvolution approaches (Fourier or Toeplitz methods, middle-upper panel TFs) or with 1-Γ function optimization performed by 3 different algorithms (middle-lower panel TFs). …”
-
10
-
11
Power flow and cost optimization with APSO variant-16 of APSO algorithm (a).
Published 2021Subjects: -
12
The flow chart of IERWHO algorithm.
Published 2024“…The wild horse optimizer (WHO) is a new metaheuristic algorithm based on the social behavior of wild horses. …”
-
13
The flow chart of WHO algorithm.
Published 2024“…The wild horse optimizer (WHO) is a new metaheuristic algorithm based on the social behavior of wild horses. …”
-
14
Optimization flow chart of the AO algorithm.
Published 2024“…Subsequently, the constraint conditions and objective functions were determined. Moreover, the multi-objective genetic algorithm optimized the structural block brake design. …”
-
15
Algorithmic flow of the verifiable delay function.
Published 2024“…<p>Algorithmic flow of the verifiable delay function.</p>…”
-
16
Completion times for different algorithms.
Published 2025“…This paper first analyzes the H-beam processing flow and appropriately simplifies it, develops a reinforcement learning environment for multi-agent scheduling, and applies the rMAPPO algorithm to make scheduling decisions. …”
-
17
The average cumulative reward of algorithms.
Published 2025“…This paper first analyzes the H-beam processing flow and appropriately simplifies it, develops a reinforcement learning environment for multi-agent scheduling, and applies the rMAPPO algorithm to make scheduling decisions. …”
-
18
-
19
Simulation settings of rMAPPO algorithm.
Published 2025“…This paper first analyzes the H-beam processing flow and appropriately simplifies it, develops a reinforcement learning environment for multi-agent scheduling, and applies the rMAPPO algorithm to make scheduling decisions. …”
-
20
Flow chart diagram of blind quantum algorithm.
Published 2024“…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”