Search alternatives:
application algorithm » approximation algorithm (Expand Search), location algorithm (Expand Search), optimization algorithm (Expand Search)
based application » broad application (Expand Search), broader application (Expand Search), broad applications (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
application algorithm » approximation algorithm (Expand Search), location algorithm (Expand Search), optimization algorithm (Expand Search)
based application » broad application (Expand Search), broader application (Expand Search), broad applications (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
341
-
342
-
343
-
344
Filter equalization enhancement algorithm flow.
Published 2025“…To solve these problems, an improved automatic recognition algorithm based on YOLOv8 model, YOLOV8-DGS is proposed in this study. …”
-
345
-
346
-
347
-
348
CNN-GRU based on GA.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
349
-
350
-
351
-
352
-
353
-
354
-
355
-
356
Cable path results of FMM in the two triangulated manifolds TM-I and TM-II.
Published 2024Subjects: -
357
-
358
-
359
-
360