Showing 1 - 20 results of 4,033 for search '(( element data algorithm ) OR ((( data code algorithm ) OR ( based application algorithm ))))', query time: 0.66s Refine Results
  1. 1

    Maple code for algorithm 3. by Peter Thompson (165468)

    Published 2025
    “…This new type of identifiability can be determined using our new algorithms, as is demonstrated by applications to various published biomedical models. …”
  2. 2

    The Pseudo-Code of the IRBMO Algorithm. by Chenyi Zhu (9383370)

    Published 2025
    “…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …”
  3. 3
  4. 4
  5. 5

    Data and code used in this article. by Yazhen Zhu (3595430)

    Published 2025
    “…Moreover, the stability and applicability of task allocation algorithms in real-world production environments face significant challenges. …”
  6. 6

    TreeMap 2016 Stand Size Code Algorithm (Image Service) by U.S. Forest Service (17476914)

    Published 2024
    “…format=iso19139 "> ISO-19139 metadata</a></li><li> <a href="https://data-usfs.hub.arcgis.com/datasets/usfs::treemap-2016-stand-size-code-algorithm-image-service "> ArcGIS Hub Dataset</a></li><li> <a href="https://apps.fs.usda.gov/fsgisx01/rest/services/RDW_ForestEcology/TreeMap_2016_StandSizeCode_Algorithm/ImageServer "> ArcGIS GeoService</a></li></ul><div> For complete information, please visit <a href="https://data.gov">https://data.gov</a>.…”
  7. 7

    QQESPM-GS - Codes and Data by Carlos Pontes (20835533)

    Published 2025
    “…<p dir="ltr">Codes and Data for the algorithms, methods and experiments presented in the paper titled "QQESPM-GS: an Efficient Solution for Geo-textual Search Parameterized by Graph-based Spatial Patterns".…”
  8. 8

    Access control pseudo-code. by Yonggang Huang (223155)

    Published 2025
    “…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. Phase data and frequency data are utilized to assess the stability of medical data attributes. …”
  9. 9

    Source code. by Jesse Wheeler (18462457)

    Published 2025
    Subjects:
  10. 10
  11. 11
  12. 12

    G R code algorithm. by R. Sakthivel (2589547)

    Published 2024
    “…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
  13. 13

    GA pseudo-code. by Jianpeng Zhang (528185)

    Published 2025
    “…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
  14. 14
  15. 15
  16. 16

    Figure data. by Emad S. Hassan (17775798)

    Published 2025
    Subjects:
  17. 17

    Coding schematic. by Dongyan Wang (195482)

    Published 2025
    “…A genetic algorithm is designed to solve this model. To verify the effectiveness of the model, we select the contact network insulators of Chinese J Intercity Railway as the case study subject. …”
  18. 18

    Pseudo-code for the study design model. by Jianpeng Zhang (528185)

    Published 2025
    “…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
  19. 19

    The code for sample size calculation. by Ying Zhou (25031)

    Published 2025
    “…Based on the above, this study aims to establish and validate a clinical prediction model for FET outcomes using support vector classification (SVC) algorithms, based on MV-FLOW<sup>™</sup> and multidimensional transvaginal ultrasound imaging features. …”
  20. 20