Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
complement c3 » complement _ (Expand Search), complement 5a (Expand Search), complement low (Expand Search)
c3 algorithm » cc3d algorithm (Expand Search), cnn algorithm (Expand Search), td3 algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
complement c3 » complement _ (Expand Search), complement 5a (Expand Search), complement low (Expand Search)
c3 algorithm » cc3d algorithm (Expand Search), cnn algorithm (Expand Search), td3 algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
Algorithmic experimental parameter design.
Published 2024“…Furthermore, the estimation of the DOA can be accurately carried out under low signal-to-noise ratio conditions. This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.…”
-
18
-
19
-
20