Showing 1,581 - 1,600 results of 4,823 for search '(( algorithm within function ) OR ((( algorithm python function ) OR ( algorithm a function ))))', query time: 0.43s Refine Results
  1. 1581

    Tweakey updating schedule. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  2. 1582

    Hybrid redundancy. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  3. 1583

    Fault detection capability of RECO and DMRC. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  4. 1584

    One SKINNY encryption round. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  5. 1585

    AE positioning projection. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  6. 1586

    K-SVD dictionary learning process. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  7. 1587

    Evaluation of denoising effect. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  8. 1588

    Fusion effectiveness of 6 groups of images. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  9. 1589

    Overall flowchart of Multi-agent fusion model. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  10. 1590

    Fusion performance of 3 groups fusion structures. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  11. 1591

    Fusion rule set. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  12. 1592
  13. 1593

    Table 1_Diagnostic performance of artificial intelligence in detecting oral potentially malignant disorders and oral cancer using medical diagnostic imaging: a systematic review an... by Rakesh Kumar Sahoo (12420508)

    Published 2024
    “…</p>Conclusion<p>These findings suggest that AI algorithms have the potential to function as reliable tools for the early diagnosis of OPMDs and oral cancer, offering significant advantages, particularly in resource-constrained settings.…”
  14. 1594

    Service coverage at different p-values. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  15. 1595

    Location of fire station facility sites. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  16. 1596

    Chromosome coding. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  17. 1597

    Definition of parameters. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  18. 1598

    Distribution of demand points by level. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  19. 1599

    S1 Data - by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  20. 1600

    Solution results when p = 8~20. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”