Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based method » based methods (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based method » based methods (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
61
-
62
-
63
Dual deconvolution algorithm: analysis code with experimental data
Published 2025“…<p dir="ltr">This software package provides key algorithms for dual-deconvolution microscopy analysis, along with both experimental and numerical data. …”
-
64
-
65
Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [33]....
Published 2025“…<p>Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0321100#pone.0321100.ref033" target="_blank">33</a>]. …”
-
66
-
67
-
68
-
69
-
70
-
71
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
72
-
73
Process of facial feature extraction and recognition method based on ipca algorithm.
Published 2025“…<p>Process of facial feature extraction and recognition method based on ipca algorithm.</p>…”
-
74
Experimental steps of modulation pattern recognition method based on IABLN algorithm.
Published 2025“…<p>Experimental steps of modulation pattern recognition method based on IABLN algorithm.</p>…”
-
75
-
76
The pseudo-code of the WOA-LSTM-PID model.
Published 2025“…To solve this problem, the study proposes an improved PID controller based on the Long Short-Term Memory (LSTM) optimized by the Whale Optimization Algorithm (WOA). …”
-
77
-
78
-
79
-
80