Search alternatives:
complementary method » complementary tool (Expand Search), complementary nature (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
complementary method » complementary tool (Expand Search), complementary nature (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
-
301
DMTD algorithm.
Published 2025“…Finally, we conducted comparative tests of the manual driving, intelligent driving algorithm (ITOR, STON), and the algorithms proposed in this paper, EITO, using real line data from the Yizhuang Line of Beijing Metro (YLBS). …”
-
302
-
303
-
304
The structure of proposed method.
Published 2025“…This algorithm employs a class-aware strategy to strengthen positive transfer effects between similar classes. …”
-
305
-
306
-
307
-
308
-
309
-
310
Phases of proposed algorithm.
Published 2025“…To address these limitations, this paper proposes a novel diagnostic framework based on Hypersoft Fuzzy Rough Set (HSFRS) theory.This hybrid approach integrates the flexibility of hypersoft sets for modeling multi-parameter relationships, the strength of fuzzy logic in handling vagueness, and the approximation capabilities of rough set theory to manage data uncertainty. Using a pseudo fuzzy binary relation, we define lower and upper approximation operators for fuzzy subsets within the parameter space. …”
-
311
-
312
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
313
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
314
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
315
-
316
Data used for the analyses in this study.
Published 2025“…This study applies and evaluates machine learning (ML) algorithms to predict LBW and identify its key risk factors in Bangladesh. …”
-
317
-
318
-
319
Ranking of ML algorithms.
Published 2025“…Especially changes in energy usage rates make it necessary to use renewable energy resources to be sustainable. …”
-
320