Showing 881 - 900 results of 15,770 for search 'Based research algorithms', query time: 0.28s Refine Results
  1. 881

    RESEARCH ON KEYWORD MINING OF ACADEMIC LIBRARY SUBJECT SERVICE by Fan Zhang

    Published 2023-06-01
    “…This research aims to explore the application of keyword mining technology in academic services of university libraries, and conducts in-depth research on the algorithm and technology of keyword mining technology, the analysis method and application of keyword mining results, the evaluation indicators of keyword mining results, and the design and implementation of optimization strategies. …”
    Get full text
    Article
  2. 882
  3. 883
  4. 884
  5. 885

    Compliance Model and Structure Optimization Method Based on Genetic Algorithm for Flexure Hinge Based on X-Lattice Structure by Yin Zhang, Jianwei Wu, Jiubin Tan

    Published 2021-01-01
    “…In order to obtain a new structure of beam flexure hinge with good performance, the flexure hinge based on the X-lattice structure is researched in this paper. …”
    Get full text
    Article
  6. 886
  7. 887
  8. 888
  9. 889
  10. 890

    Mechanical product design and manufacturing system based on CNN and server optimization algorithm by Tian Lei, Zhao Ance

    Published 2025-04-01
    “…In the cloud manufacturing mode of manufacturing enterprises, the design of mechanical products requires server optimization based on the demand side. The existing server optimization algorithms are not intelligent enough for server discovery and optimization in this mode. …”
    Get full text
    Article
  11. 891
  12. 892

    A novel pedestrian detection algorithm based on data fusion of face images by Jianhu Zheng, Jinshuan Peng

    Published 2019-05-01
    “…To address this issue, we propose a novel pedestrian detection algorithm with multisource face images, which involves a face recognition algorithm based on the conjugate orthonormalized partial least-squares regression analysis under a complex lighting environment. …”
    Get full text
    Article
  13. 893

    Fog node intrusion detection and response based on SVMIF and INSGA-II algorithm by Zhuojun Luo

    Published 2025-12-01
    “…To have a response behavior for protection when intrusion is detected, the study designed a fog node intrusion response method based on security policy decision and used improved non-dominated sorting genetic algorithms-II to select a more appropriate security decision. …”
    Get full text
    Article
  14. 894
  15. 895

    Soft detection model of corrosion leakage risk based on KNN and random forest algorithms by Yang YANG, Chengzhi LI, Xuan DU, Xiao YU, Shaohua DONG

    Published 2024-09-01
    “…In comparison to prior research, the model displayed enhanced prediction accuracy and reliability, attributed to innovations in extracting multi-factor coupling relationships and algorithm choices. …”
    Get full text
    Article
  16. 896
  17. 897
  18. 898
  19. 899
  20. 900