Search alternatives:
codings algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), hastings algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data codings » data recordings (Expand Search), data encoding (Expand Search), data codes (Expand Search)
codings algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), hastings algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data codings » data recordings (Expand Search), data encoding (Expand Search), data codes (Expand Search)
-
41
iFAD∞ and other flow direction algorithms with test data
Published 2025“…<p dir="ltr">The Java codes for all the drainage direction algorithms used in the study entitled “A New Multiple Flow Direction Algorithm for Determining Limited Dispersive Domain Based on Flow Aggregation Technique” are provided as an Eclipse Java project. …”
-
42
-
43
-
44
Reported MATLAB data code.
Published 2025“…Validation with standard rheometer data showed reasonable agreement in elasticity, with percent differences of 2.1% for the hard and 13.3% for the soft phantoms. …”
-
45
Matlab code of a function used in S2 File.
Published 2024“…The algorithm obtains one- or more-years-ahead prediction values using all past information from the data. …”
-
46
Optimization-Driven Steganographic System Based on Fused Maps and Blowfish Encryption
Published 2025Subjects: -
47
Table 1_Comprehensive analysis of multi-omics vaccine response data using MOFA and Stabl algorithms.xlsx
Published 2025“…Donors were also assigned a binary value (0 or 1), being labeled as high responders if they had a fold change ≥4 of the antibody titer for hemagglutination inhibition (HAI) from day 0 to day 28, and low responders otherwise (0). In this project, we used the MOFA and Stabl algorithms to analyze FluPRINT, estimate the population structure from the data, and identify the most important features for predicting response to the vaccine.…”
-
48
Scatter diagram of different principal elements.
Published 2025“…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
49
GA pseudo-code.
Published 2025“…Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. …”
-
50
Prediction of pharmaceuticals occurrence based on sales data and Machine learning algorithms.
Published 2025“…</p><p dir="ltr"><b>Antibioticos/Carbamazepina</b>: contains the main codes of the prediction models to classify the occurrence concentrations of some antibiotics and Carbamazepine, by tree boosting algorithms.…”
-
51
S1 Code -
Published 2024“…In this study, the harmonic signal is used as an input to estimate the GFRFs. To improve the estimation accuracy, the GFRFs of an analog circuit are solved directly using time-domain data. …”
-
52
-
53
-
54
-
55
Genes of the epistastic interactions detected on the seven GWAS data using Epi-SSA.
Published 2024Subjects: -
56
Pseudo-code for the study design model.
Published 2025“…Genetic algorithm is utilized to solve and optimize the data, one-dimensional multi-scale convolutional neural network is combined with gated recurrent unit to improve the network intrusion detection model, and finally the detection and defense of industrial control network intrusion is completed. …”
-
57
Codes for high-order analytical continuation algorithms based on direct derivation and recursion methods
Published 2024“…The optimal order of the analytical continuation algorithm is contingent upon the noise level of gravity data. …”
-
58
-
59
-
60