Search alternatives:
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
element mining » element mapping (Expand Search), element bonding (Expand Search), element modeling (Expand Search)
tests control » pest control (Expand Search), versus control (Expand Search), cells control (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), modeling algorithm (Expand Search), finding algorithm (Expand Search)
element mining » element mapping (Expand Search), element bonding (Expand Search), element modeling (Expand Search)
tests control » pest control (Expand Search), versus control (Expand Search), cells control (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
GA pseudo-code.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
8
-
9
Pseudo-code for the study design model.
Published 2025“…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”
-
10
-
11
-
12
-
13
-
14
-
15
Flow chart of implementation of metaheuristic algorithm-PI control BLDC motor.
Published 2024Subjects: -
16
-
17
-
18
Pseudo code.
Published 2025“…Overall, the designed model can optimize the accuracy of engineering budgeting and the ability to control costs.</p></div>…”
-
19
-
20