بدائل البحث:
selection algorithm » detection algorithm (توسيع البحث), detection algorithms (توسيع البحث), prediction algorithms (توسيع البحث)
based selection » based detection (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
selection algorithm » detection algorithm (توسيع البحث), detection algorithms (توسيع البحث), prediction algorithms (توسيع البحث)
based selection » based detection (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
-
1
The Pseudo-Code of the IRBMO Algorithm.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
2
-
3
-
4
Greedy optimization algorithm.
منشور في 2024"…The horizontal orange dashed line indicates the codelength of the corresponding simple graph model without motifs (see Motif-free reference codes). (D) The algorithm is run a hundred times for each dyadic base model and the most compressing model is selected. …"
-
5
-
6
-
7
Pseudo Code of RBMO.
منشور في 2025"…To adapt to the feature selection problem, we convert the continuous optimization algorithm to binary form via transfer function, which further enhances the applicability of the algorithm. …"
-
8
-
9
GA pseudo-code.
منشور في 2025"…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …"
-
10
-
11
-
12
G R code algorithm.
منشور في 2024"…The algorithm was developed and coded in Verilog and simulated using Modelsim. …"
-
13
Pseudo-code for the study design model.
منشور في 2025"…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …"
-
14
-
15
-
16
-
17
-
18
Data and code used in this article.
منشور في 2024"…<div><p>In this study, the traditional lag structure selection method in the Mixed Data Sampling (MIDAS) regression model for forecasting GDP was replaced with a machine learning approach using the particle swarm optimization algorithm (PSO). …"
-
19
-
20