Showing 1 - 20 results of 14,208 for search '(((( element method algorithm ) OR ( complex system algorithm ))) OR ( model using algorithm ))', query time: 0.58s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…Furthermore, the estimation of the DOA can be accurately carried out under low signal-to-noise ratio conditions. This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.…”
  6. 6

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…Furthermore, the estimation of the DOA can be accurately carried out under low signal-to-noise ratio conditions. This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.…”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  15. 15

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  16. 16

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  17. 17
  18. 18
  19. 19

    The flowchart of QLDE algorithm. by Guanqun Wang (705958)

    Published 2025
    “…Initially, a correlation matrix is used to identify redundant noise and multicollinear features within customer feature groups, and Principal Component Analysis is applied for denoising and dimensionality reduction to enhance the ability of the model to identify potential features. …”
  20. 20