بدائل البحث:
bayesian optimization » based optimization (توسيع البحث)
source optimization » resource optimization (توسيع البحث), surface optimization (توسيع البحث), source utilization (توسيع البحث)
mask bayesian » task bayesian (توسيع البحث), a bayesian (توسيع البحث), art bayesian (توسيع البحث)
primary data » primary care (توسيع البحث)
data source » data sources (توسيع البحث)
binary mask » binary image (توسيع البحث)
bayesian optimization » based optimization (توسيع البحث)
source optimization » resource optimization (توسيع البحث), surface optimization (توسيع البحث), source utilization (توسيع البحث)
mask bayesian » task bayesian (توسيع البحث), a bayesian (توسيع البحث), art bayesian (توسيع البحث)
primary data » primary care (توسيع البحث)
data source » data sources (توسيع البحث)
binary mask » binary image (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
Machine learning deployment strategies and schematic illustration of the proposed generative adversarial algorithm for domain adaptation.
منشور في 2022"…<b>(C)</b> Schematic of the proposed algorithm. a) Real data from a source domain is translated by the generator to resemble data from a specified target domain while maintaining underlying semantic qualities of the input image. b) Translated data is reconstructed by the generator to resemble data from the source domain to maintain domain-agnostic image characteristics with a semantic consistency constraint ensuring that reconstructed images maintain the semantic characteristics of the source data. c) The discriminator aims to distinguish between real and synthetic images and identify the domain of input images to constrain the generator to produce realistic-looking synthetic images from a specified domain. d) A target discriminator is fine-tuned on synthetic images to better identify opacity in the target domain.…"
-
9
Dataset of networks used in assessing the Troika algorithm for clique partitioning and community detection
منشور في 2025"…</p><p dir="ltr"><br></p><p dir="ltr">For more information about the data, one may refer to the article below:</p><p dir="ltr">Aref S, Ng B (2025) Troika algorithm: Approximate optimization for accurate clique partitioning and clustering of weighted networks. …"
-
10
-
11
ECE6379_PSOM.zip
منشور في 2021"…Optimization algorithms that are commonly used to solve these problems will also be covered including linear programming, mixed-integer linear programming, Lagrange relaxation, dynamic programming, branch and bound, and duality theory.…"
-
12
Results of Comprehensive weighting.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
13
The prediction error of each model.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
14
VIF analysis results for hazard-causing factors.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
15
Benchmark function information.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
16
Geographical distribution of the study area.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
17
Results for model hyperparameter values.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
18
Flow chart of this study.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
19
Stability analysis of each model.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"
-
20
Robustness Analysis of each model.
منشور في 2025"…The model is developed and validated using data from 159 debris flow-prone gullies, integrating deep convolutional, recurrent, and attention-based architectures, with hyperparameters autonomously optimized by IKOA. …"