Showing 301 - 320 results of 9,863 for search '(((( complementary method algorithm ) OR ( element data algorithm ))) OR ( data using algorithm ))', query time: 0.57s Refine Results
  1. 301

    DMTD algorithm. by Yunhu Huang (21402795)

    Published 2025
    “…Finally, we conducted comparative tests of the manual driving, intelligent driving algorithm (ITOR, STON), and the algorithms proposed in this paper, EITO, using real line data from the Yizhuang Line of Beijing Metro (YLBS). …”
  2. 302
  3. 303
  4. 304

    The structure of proposed method. by Huiying Zhang (200681)

    Published 2025
    “…This algorithm employs a class-aware strategy to strengthen positive transfer effects between similar classes. …”
  5. 305
  6. 306
  7. 307
  8. 308
  9. 309
  10. 310

    Phases of proposed algorithm. by Muhammad Abdullah (3357692)

    Published 2025
    “…To address these limitations, this paper proposes a novel diagnostic framework based on Hypersoft Fuzzy Rough Set (HSFRS) theory.This hybrid approach integrates the flexibility of hypersoft sets for modeling multi-parameter relationships, the strength of fuzzy logic in handling vagueness, and the approximation capabilities of rough set theory to manage data uncertainty. Using a pseudo fuzzy binary relation, we define lower and upper approximation operators for fuzzy subsets within the parameter space. …”
  11. 311
  12. 312

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  13. 313

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  14. 314

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  15. 315
  16. 316

    Data used for the analyses in this study. by Nourin Sultana (22339463)

    Published 2025
    “…This study applies and evaluates machine learning (ML) algorithms to predict LBW and identify its key risk factors in Bangladesh. …”
  17. 317
  18. 318
  19. 319

    Ranking of ML algorithms. by Yasemin Ayaz Atalan (21989402)

    Published 2025
    “…Especially changes in energy usage rates make it necessary to use renewable energy resources to be sustainable. …”
  20. 320