يعرض 61 - 80 نتائج من 9,039 نتيجة بحث عن '(( elements method algorithm ) OR ((( data code algorithm ) OR ( based methods algorithm ))))', وقت الاستعلام: 0.61s تنقيح النتائج
  1. 61
  2. 62

    Data and code. حسب Hao Cao (2248066)

    منشور في 2025
  3. 63

    Data and code used in this article. حسب Feng Shen (151470)

    منشور في 2024
    "…<div><p>In this study, the traditional lag structure selection method in the Mixed Data Sampling (MIDAS) regression model for forecasting GDP was replaced with a machine learning approach using the particle swarm optimization algorithm (PSO). …"
  4. 64

    Dual deconvolution algorithm: analysis code with experimental data حسب Wonshik Choi (18877660)

    منشور في 2025
    "…<p dir="ltr">This software package provides key algorithms for dual-deconvolution microscopy analysis, along with both experimental and numerical data. …"
  5. 65
  6. 66

    Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [33].... حسب Zhao Li (300229)

    منشور في 2025
    "…<p>Optimization results of MBB multi-material structure under different methods. (a) A level-set method for multi-material topology optimization [<a href="http://www.plosone.org/article/info:doi/10.1371/journal.pone.0321100#pone.0321100.ref033" target="_blank">33</a>]. …"
  7. 67
  8. 68

    data_codes.rar حسب Zhe Li (22011704)

    منشور في 2025
  9. 69
  10. 70
  11. 71

    Research data for paper: Efficient Event-based Delay Learning in Spiking Neural Networks حسب Balázs Mészáros (16890225)

    منشور في 2025
    "…<p dir="ltr">The data in this repository accompanies the paper 'Efficient Event-based Delay Learning in Spiking Neural Networks'</p><p dir="ltr">The data relates to 4 benchmarks:</p><ol><li>Spiking Heidelberg Digits (SHD).…"
  12. 72
  13. 73

    GA pseudo-code. حسب Jianpeng Zhang (528185)

    منشور في 2025
    "…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …"
  14. 74

    Process of facial feature extraction and recognition method based on ipca algorithm. حسب Lu Lin (201289)

    منشور في 2025
    "…<p>Process of facial feature extraction and recognition method based on ipca algorithm.</p>…"
  15. 75

    Experimental steps of modulation pattern recognition method based on IABLN algorithm. حسب Ting Xie (191025)

    منشور في 2025
    "…<p>Experimental steps of modulation pattern recognition method based on IABLN algorithm.</p>…"
  16. 76
  17. 77
  18. 78

    The pseudo-code of the WOA-LSTM-PID model. حسب Dayu Zhang (710629)

    منشور في 2025
    "…To solve this problem, the study proposes an improved PID controller based on the Long Short-Term Memory (LSTM) optimized by the Whale Optimization Algorithm (WOA). …"
  19. 79
  20. 80