Showing 41 - 60 results of 17,084 for search '(( algorithm using function ) OR ((( algorithm both function ) OR ( algorithm a function ))))', query time: 0.53s Refine Results
  1. 41

    Images of partial benchmark functions. by ZeSheng Lin (20501356)

    Published 2025
    “…In order to effectively handle extensive datasets, researchers have introduced diverse classification algorithms. Notably, Kernel Extreme Learning Machine (KELM), as a fast and effective classification method, has received widespread attention. …”
  2. 42
  3. 43
  4. 44

    Multi-scale detection of hierarchical community architecture in structural and functional brain networks by Arian Ashourvan (6685232)

    Published 2019
    “…Finally, we build an explicitly multimodal multiplex graph that combines both structural and functional connectivity in a single model, and we identify the topological scales where resting state functional connectivity and underlying structural connectivity show similar <i>versus</i> unique hierarchical community architecture. …”
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52

    Standard benchmark functions used for the experimentation of EOSA and other similar optimization algorithms. by Tehnan I. A. Mohamed (16846175)

    Published 2023
    “…<p>Standard benchmark functions used for the experimentation of EOSA and other similar optimization algorithms.…”
  13. 53
  14. 54

    Analytic Gradients for Density Fitting MP2 Using Natural Auxiliary Functions by Klára Petrov (19251734)

    Published 2024
    “…Here, for the first time, we discuss the theory of analytic derivatives for correlation methods employing the NAF approximation on the example of MP2. A detailed algorithm for the gradient calculation with the NAF approximation is proposed in the framework of the method of Lagrange multipliers. …”
  15. 55

    Function graph and algorithm iterative graph. by WanRu Zhao (18980374)

    Published 2024
    “…The wild horse optimizer (WHO) is a new metaheuristic algorithm based on the social behavior of wild horses. …”
  16. 56

    Flow chart diagram of blind quantum algorithm. by Sultan H. Almotiri (14029251)

    Published 2024
    “…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  17. 57
  18. 58
  19. 59
  20. 60