يعرض 161 - 180 نتائج من 5,302 نتيجة بحث عن '(( algorithm python function ) OR ((( algorithm both function ) OR ( algorithms risk function ))))', وقت الاستعلام: 0.66s تنقيح النتائج
  1. 161

    A Genetic Algorithm Approach for Compact Wave Function Representations in Spin-Adapted Bases حسب Maru Song (22593561)

    منشور في 2025
    "…Crucially, we propose fitness functions based on approximate measures of the wave function compactness, which enable inexpensive genetic algorithm searches. …"
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166

    Data Sheet 1_A risk prediction model for poor joint function recovery after ankle fracture surgery based on interpretable machine learning.pdf حسب Congyang Li (10012877)

    منشور في 2025
    "…Objective<p>Currently, there is no individualized prediction model for joint function recovery after ankle fracture surgery. This study aims to develop a prediction model for poor recovery following ankle fracture surgery using various machine learning algorithms to facilitate early identification of high-risk patients.…"
  7. 167
  8. 168

    Comparison of deconvolution and optimization algorithms on a batch of data. حسب Ali-Kemal Aydin (10968731)

    منشور في 2021
    "…Output is given by the vascular response, measured as the change in speed of red blood cells flowing inside a capillary proximal to the recorded neuronal activation (in yellow, right panel). Both experimental data have been resampled at 50ms and used to compute a set of TFs (in orange) either with direct deconvolution approaches (Fourier or Toeplitz methods, middle-upper panel TFs) or with 1-Γ function optimization performed by 3 different algorithms (middle-lower panel TFs). …"
  9. 169
  10. 170

    Completion times for different algorithms. حسب Jianbin Zheng (587000)

    منشور في 2025
    "…This paper first analyzes the H-beam processing flow and appropriately simplifies it, develops a reinforcement learning environment for multi-agent scheduling, and applies the rMAPPO algorithm to make scheduling decisions. The effectiveness of the proposed method is then verified on both the physical work cell for riveting and welding and its digital twin platform, and it is compared with other baseline multi-agent reinforcement learning methods (MAPPO, MADDPG, and MASAC). …"
  11. 171

    The average cumulative reward of algorithms. حسب Jianbin Zheng (587000)

    منشور في 2025
    "…This paper first analyzes the H-beam processing flow and appropriately simplifies it, develops a reinforcement learning environment for multi-agent scheduling, and applies the rMAPPO algorithm to make scheduling decisions. The effectiveness of the proposed method is then verified on both the physical work cell for riveting and welding and its digital twin platform, and it is compared with other baseline multi-agent reinforcement learning methods (MAPPO, MADDPG, and MASAC). …"
  12. 172

    Both Ankle fNIRS MI dataset حسب Hammad Gilani (8060012)

    منشور في 2025
    "…<p><br></p><p dir="ltr">This dataset contains functional near-infrared spectroscopy (fNIRS) signals recorded during motor imagery (MI) tasks of lower limb movements. …"
  13. 173

    Plot of coverage attenuation function. حسب Junjie He (700642)

    منشور في 2024
    الموضوعات: "…coverage attenuation function…"
  14. 174

    AUC scores of anomaly detection algorithms. حسب GaoXiang Zhao (21499525)

    منشور في 2025
    "…Empirical evaluations conducted on multiple benchmark datasets demonstrate that the proposed method outperforms classical anomaly detection algorithms while surpassing conventional model averaging techniques based on minimizing standard loss functions. …"
  15. 175

    Recall scores of anomaly detection algorithms. حسب GaoXiang Zhao (21499525)

    منشور في 2025
    "…Empirical evaluations conducted on multiple benchmark datasets demonstrate that the proposed method outperforms classical anomaly detection algorithms while surpassing conventional model averaging techniques based on minimizing standard loss functions. …"
  16. 176
  17. 177

    Fuzzy weight. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  18. 178

    Block diagram of lattice-based cryptography. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  19. 179

    Weight of the quantum techniques. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  20. 180

    Block description of homomorphic encryption. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"