Showing 1 - 20 results of 9,827 for search '(((( data backing algorithm ) OR ( data using algorithm ))) OR ( element data algorithm ))', query time: 0.40s Refine Results
  1. 1
  2. 2

    Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things by Ashok Kumar K (21441108)

    Published 2025
    “…Then, the data is pre-processed using Variational Bayesian-based Maximum Correntropy Cubature Kalman Filtering (VBMCCKF) of noise removal and data enhancement. …”
  3. 3

    Comparison of different optimization algorithms. by Hang Zhao (143592)

    Published 2025
    Subjects: “…crayfish optimization algorithm…”
  4. 4
  5. 5
  6. 6

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  7. 7
  8. 8

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  9. 9

    Clustering results on R15 and MNIST by using FKmeansCB. by Zilong Deng (4594117)

    Published 2025
    Subjects: “…distributed clustering algorithm…”
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    The run time for each algorithm in seconds. by Edward Antonian (21453161)

    Published 2025
    “…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …”
  16. 16
  17. 17

    Risk element category diagram. by Yao Hu (3479972)

    Published 2025
    “…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …”
  18. 18
  19. 19

    The influence of parameters<i>k1</i> and <i>k2</i> on clustering results. by Zilong Deng (4594117)

    Published 2025
    Subjects: “…distributed clustering algorithm…”
  20. 20

    A basic federated clustering framework. by Zilong Deng (4594117)

    Published 2025
    Subjects: “…distributed clustering algorithm…”