Search alternatives:
based optimization » whale optimization (Expand Search)
work optimization » wolf optimization (Expand Search), swarm optimization (Expand Search), dose optimization (Expand Search)
levels based » level based (Expand Search), models based (Expand Search), cells based (Expand Search)
binary mask » binary image (Expand Search)
based work » based network (Expand Search)
mask based » task based (Expand Search), tasks based (Expand Search), risk based (Expand Search)
based optimization » whale optimization (Expand Search)
work optimization » wolf optimization (Expand Search), swarm optimization (Expand Search), dose optimization (Expand Search)
levels based » level based (Expand Search), models based (Expand Search), cells based (Expand Search)
binary mask » binary image (Expand Search)
based work » based network (Expand Search)
mask based » task based (Expand Search), tasks based (Expand Search), risk based (Expand Search)
-
1
-
2
A* Path-Finding Algorithm to Determine Cell Connections
Published 2025“…Future work aims to generalize this algorithm for broader biological applications by training additional Cellpose models and adapting the A* framework.…”
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
Features selected by optimization algorithms.
Published 2024“…After the image has been pre-processed, it is segmented using the Thresholding Level set approach. Next, we propose a hybrid chaotic sand cat optimization technique, together with the Remora Optimization Algorithm (ROA) for feature selection. …”
-
11
Equipment demand forecasting and procurement reserve optimization framework.
Published 2025Subjects: -
12
-
13
-
14
-
15
-
16
-
17
Image_1_Identification of a Novel Prognostic Signature for Gastric Cancer Based on Multiple Level Integration and Global Network Optimization.TIF
Published 2021“…To mine for novel prognostic signatures associated with GC, we performed topological analysis, a random walk with restart algorithm, in the GCsLMM from three levels, miRNA-, mRNA-, and lncRNA-levels. …”
-
18
Summary of related work.
Published 2024“…Current works only facilitate image-level sharing and use common cryptographic algorithms. …”
-
19
Comparison with related works.
Published 2024“…Current works only facilitate image-level sharing and use common cryptographic algorithms. …”
-
20