Showing 161 - 180 results of 5,153 for search '(((( develop robust algorithm ) OR ( element data algorithm ))) OR ( data processing algorithm ))', query time: 0.45s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166
  7. 167
  8. 168

    Solution results of different algorithms. by Meilin Zhu (688698)

    Published 2025
    “…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
  9. 169

    Politus Dataset: A Political Public Opinion Dataset from Turkish Social Media Processed by Privacy-Preserving Artificial Intelligence Algorithms by Erdem Yörük (20428418)

    Published 2024
    “…<p dir="ltr">The Politus Dataset is a large-scale dataset designed to analyze political public opinion in Turkey, created from social media data on X (formerly Twitter) and processed using privacy-preserving artificial intelligence algorithms.…”
  10. 170
  11. 171

    Overview of the ROI determination algorithm. by Virgil Christian Garcia Castillo (19688355)

    Published 2024
    Subjects: “…morphological image processing…”
  12. 172
  13. 173

    S1 Data - by Zhengyu Xu (8550660)

    Published 2025
    Subjects:
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178

    The weight optimization process. by Guomei Cui (20721578)

    Published 2025
    “…However, the training data of this model comes from the simulation environment, which may deviate from the real game data. …”
  19. 179

    Evaluation of model aggregation algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  20. 180

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”