Search alternatives:
processing method » processing methods (Expand Search), promising method (Expand Search), preprocessing methods (Expand Search)
processing method » processing methods (Expand Search), promising method (Expand Search), preprocessing methods (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
Three Remarkable Characteristics Covering Three Demands and Solving Three Challenges.
Published 2025Subjects: -
9
-
10
-
11
-
12
Pareto front representations obtained by solving the BIOBJ problem using the ROSE algorithm and the NBI algorithm, as well as a visualization of the solution process of the ROSE al...
Published 2025Subjects: “…existing deterministic methods…”
-
13
The comparison of these thickening methods.
Published 2025“…However, there are currently no reports on using additive manufacturing technology to optimize pipeline ellipticity and improve pipe end strength and stiffness. This article solves the problem of weak weld strength at the connection end of oil pipelines and proposes for the first time the method of using arc additive manufacturing technology to thicken and reinforce the pipe end. …”
-
14
Overlapping sampling process.
Published 2025“…This study effectively solves the problem of small sample sizes for circular saw blade wear data, and provides an efficient and accurate method for circular saw blade wear identification under complex working conditions, which has important practical significance for improving the safety and efficiency of spent fuel assembly cutting.…”
-
15
-
16
Table 1_Operationalizing education 4.0: a structured method for course materials and assessment alignment.docx
Published 2025“…Frameworks such as Education 4.0 emphasize the development of abilities, skills, attitudes, and values; such as problem-solving, critical thinking, adaptability, and curiosity; alongside disciplinary knowledge. …”
-
17
-
18
-
19
-
20
GA process.
Published 2025“…<div><p>The current industrial control system network is susceptible to data theft attacks such as SQL injection in practical applications, resulting in data loss or leakage of enterprise secrets. To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …”