Search alternatives:
function optimization » reaction optimization (Expand Search), formulation optimization (Expand Search), generation optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
based function » based functional (Expand Search), basis function (Expand Search), basis functions (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
binary i » binary _ (Expand Search)
i design » _ design (Expand Search), a design (Expand Search), co design (Expand Search)
function optimization » reaction optimization (Expand Search), formulation optimization (Expand Search), generation optimization (Expand Search)
design optimization » bayesian optimization (Expand Search)
based function » based functional (Expand Search), basis function (Expand Search), basis functions (Expand Search)
binary based » library based (Expand Search), linac based (Expand Search), binary mask (Expand Search)
binary i » binary _ (Expand Search)
i design » _ design (Expand Search), a design (Expand Search), co design (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
DE algorithm flow.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
7
Test results of different algorithms.
Published 2025“…In the experiments, optimization metrics such as kinematic optimization rate (calculated based on the shortest path and connectivity between functional areas), space utilization rate (calculated by the ratio of room area to total usable space), and functional fitness (based on the weighted sum of users’ subjective evaluations and functional matches) all perform well. …”
-
8
MSE for ILSTM algorithm in binary classification.
Published 2023“…The ILSTM was then used to build an efficient intrusion detection system for binary and multi-class classification cases. The proposed algorithm has two phases: phase one involves training a conventional LSTM network to get initial weights, and phase two involves using the hybrid swarm algorithms, CBOA and PSO, to optimize the weights of LSTM to improve the accuracy. …”
-
9
-
10
-
11
Python-Based Algorithm for Estimating NRTL Model Parameters with UNIFAC Model Simulation Results
Published 2025Subjects: -
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
Medium-scale dataset comparative analysis using the number of features selected.
Published 2023Subjects: -
20