Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm steps » algorithm shows (Expand Search), algorithm models (Expand Search)
algorithm cost » algorithm could (Expand Search), algorithms across (Expand Search)
steps function » step function (Expand Search), its function (Expand Search), cep function (Expand Search)
cost function » cell function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm steps » algorithm shows (Expand Search), algorithm models (Expand Search)
algorithm cost » algorithm could (Expand Search), algorithms across (Expand Search)
steps function » step function (Expand Search), its function (Expand Search), cep function (Expand Search)
cost function » cell function (Expand Search)
-
101
-
102
Swarm intelligence algorithms for multi-objective IMP: Step-by-step improvement
Published 2022“…Algorithms implemented on article "<b>A step-by-step solution for the multi-objective influence spread problem</b>". …”
-
103
-
104
-
105
-
106
-
107
-
108
-
109
A Python Package for the Localization of Protein Modifications in Mass Spectrometry Data
Published 2022Subjects: -
110
-
111
-
112
-
113
The final values of the cost function, the selected features number, and the implementation time for the introduced meta-heuristic algorithms.
Published 2025“…<p>The final values of the cost function, the selected features number, and the implementation time for the introduced meta-heuristic algorithms.…”
-
114
-
115
Power flow and cost optimization with APSO variant-16 of APSO algorithm (b).
Published 2021Subjects: -
116
Power flow and cost optimization with APSO variant-16 of APSO algorithm (a).
Published 2021Subjects: -
117
-
118
-
119
Computational cost of the proposed approach.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
120
Table 1_Machine learning-based gait adaptation dysfunction identification using CMill-based gait data.docx
Published 2024“…ML models based on Support Vector Machine, Decision Tree, Multi-layer Perceptron, K-Nearest Neighbors, and AdaCost algorithm were trained to classify individuals with and without GAD. …”