Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
based data » used data (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
based data » used data (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
41
-
42
Scatter diagram of different principal elements.
Published 2025“…Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
43
-
44
S1 Data - A GNSS receiver positioning algorithm based on weighting the statistical properties of discontinuous signals at lower rotation speeds
Published 2025“…Weighted Kalman Filter Algorithm in C Code. S3 File. NavSolveKalman.h. Weighted Kalman Filter Algorithm in C Code. …”
-
45
-
46
-
47
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
48
G R code algorithm.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
49
-
50
-
51
-
52
Pseudo-code for the study design model.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
53
-
54
-
55
-
56
-
57
ZM deep convection code structure.
Published 2024“…Therefore, this paper proposes a GPU-based acceleration algorithm for the ZM scheme. Based on the computation characteristics of the ZM scheme, we propose its one-demensional and two-demensional acceleration algorithms based on GPU. …”
-
58
-
59
-
60