Showing 761 - 780 results of 2,594 for search '(( algorithm from function ) OR ((( algorithm python function ) OR ( algorithm beach function ))))', query time: 0.42s Refine Results
  1. 761
  2. 762
  3. 763

    Table 1_Compatibility optimization of the traditional Chinese medicines ‘Eczema mixture’ based on back-propagation artificial neural network and non-dominated sorting genetic algor... by Xin He (48101)

    Published 2025
    “…The 6-n-2 three-layers of back-propagation artificial neural network (BP-ANN) was employed to model the two defined objective functions. With the predictive models, the Pareto front was determined by a variant of non-dominated sorting genetic algorithm II(VNSGAII) to provide the optimal prescription set.…”
  4. 764

    Graphical summary of results in this study. by Hailin Li (453832)

    Published 2025
    “…Podocyte heterogeneity and functional differences in DKD were observed. Multiple machine-learning algorithms were used to screen and construct diagnostic models to identify hub differentially expressed podocyte marker genes (DE-podos), revealing ARHGEF26 as a significantly downregulated marker in DKD. …”
  5. 765

    The brief description on the WTCCC dataset. by Liyan Sun (760586)

    Published 2024
    “…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
  6. 766

    The penetrance tables for the 8 DNME models. by Liyan Sun (760586)

    Published 2024
    “…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
  7. 767

    The penetrance tables for the 8 DME models. by Liyan Sun (760586)

    Published 2024
    “…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
  8. 768

    The penetrance tables for the 6 DNME3 models. by Liyan Sun (760586)

    Published 2024
    “…Epi-SSA draws inspiration from the sparrow search algorithm and optimizes the population based on multiple objective functions in each iteration, in order to be able to more precisely identify epistatic interactions.…”
  9. 769
  10. 770
  11. 771

    Data Sheet 1_Simplified two-compartment neuron with calcium dynamics capturing brain-state specific apical-amplification, -isolation and -drive.pdf by Elena Pastorelli (7024235)

    Published 2025
    “…A machine learning evolutionary algorithm, guided by a set of fitness functions, selected parameters defining neurons that express the desired apical dendritic mechanisms. …”
  12. 772
  13. 773
  14. 774
  15. 775

    <b>A Multi-Pathology Ballistocardiogram Dataset for Cardiac Function Monitoring and Arrhythmia Assessment</b> by Jing Zhan (20716673)

    Published 2025
    “…Denoised BCG signal (Column 3), derived using the Enhanced Singular Value Thresholding (ESVT) algorithm.</p><p dir="ltr"><b>5 Signal visualization</b></p><p dir="ltr">(1) File name: signal.pdf</p><p dir="ltr">(2) Content: A graphical representation of the signals from signal.csv. …”
  16. 776
  17. 777
  18. 778

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  19. 779

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  20. 780

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”