Search alternatives:
methods algorithm » means algorithm (Expand Search), network algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based methods » mixed methods (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
methods algorithm » means algorithm (Expand Search), network algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based methods » mixed methods (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
-
61
-
62
F1 score of edges selected through cross-validation on the random graph dataset.
Published 2024Subjects: -
63
Dual deconvolution algorithm: analysis code with experimental data
Published 2025“…<p dir="ltr">This software package provides key algorithms for dual-deconvolution microscopy analysis, along with both experimental and numerical data. …”
-
64
-
65
The flowchart of GWO-VMD method.
Published 2025“…We propose a novel seismic random noise suppression method based on enhanced variational mode decomposition (VMD) with grey wolf optimization (GWO) algorithm, which applies the envelope entropy to evaluate the wolf individual fitness, determine the grey wolf hierarchy, and obtain the optimized key elements <i><i>K</i></i> and <i>α</i> in VMD. …”
-
66
-
67
-
68
-
69
-
70
Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks
Published 2025“…<p dir="ltr">The data in this repository accompanies the paper 'Efficient Event-based Delay Learning in Spiking Neural Networks'</p><p dir="ltr">The data relates to 4 benchmarks:</p><ol><li>Spiking Heidelberg Digits (SHD).…”
-
71
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
72
Process of facial feature extraction and recognition method based on ipca algorithm.
Published 2025“…<p>Process of facial feature extraction and recognition method based on ipca algorithm.</p>…”
-
73
Experimental steps of modulation pattern recognition method based on IABLN algorithm.
Published 2025“…<p>Experimental steps of modulation pattern recognition method based on IABLN algorithm.</p>…”
-
74
-
75
-
76
-
77
-
78
Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [33]....
Published 2025“…<p>Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0321100#pone.0321100.ref033" target="_blank">33</a>]. …”
-
79
The pseudo-code of the WOA-LSTM-PID model.
Published 2025“…To solve this problem, the study proposes an improved PID controller based on the Long Short-Term Memory (LSTM) optimized by the Whale Optimization Algorithm (WOA). …”
-
80