Search alternatives:
complementary control » complementary tool (Expand Search), complementary role (Expand Search), complementary method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
complementary control » complementary tool (Expand Search), complementary role (Expand Search), complementary method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
-
1
-
2
Comparison of different optimization algorithms.
Published 2025Subjects: “…crayfish optimization algorithm…”
-
3
-
4
Algorithmic experimental parameter design.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
5
Spatial spectrum estimation for three algorithms.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
6
-
7
The run time for each algorithm in seconds.
Published 2025“…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …”
-
8
-
9
Risk element category diagram.
Published 2025“…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …”
-
10
-
11
-
12
-
13
-
14
Scatter diagram of different principal elements.
Published 2025“…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
15
-
16
List of the time used by each algorithm.
Published 2024“…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
-
17
Sanitized databases using MLHProtector algorithm.
Published 2025“…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
-
18
-
19
-
20