يعرض 1 - 20 نتائج من 9,786 نتيجة بحث عن '(((( element learning algorithm ) OR ( elements sorting algorithms ))) OR ( data using algorithm ))', وقت الاستعلام: 0.58s تنقيح النتائج
  1. 1

    Comparison of different optimization algorithms. حسب Hang Zhao (143592)

    منشور في 2025
    الموضوعات: "…crayfish optimization algorithm…"
  2. 2

    Algorithmic experimental parameter design. حسب Chuanxi Xing (20141665)

    منشور في 2024
    "…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
  3. 3

    Spatial spectrum estimation for three algorithms. حسب Chuanxi Xing (20141665)

    منشور في 2024
    "…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
  4. 4
  5. 5
  6. 6

    Risk element category diagram. حسب Yao Hu (3479972)

    منشور في 2025
    "…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …"
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    List of the time used by each algorithm. حسب JiaMing Gong (20427837)

    منشور في 2024
    "…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …"
  12. 12

    Sanitized databases using MLHProtector algorithm. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …"
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20