Search alternatives:
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
model algorithm » novel algorithm (Expand Search), modbo algorithm (Expand Search), modeling algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
elements model » element model (Expand Search), elements mges (Expand Search), elements over (Expand Search)
level » levels (Expand Search)
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
model algorithm » novel algorithm (Expand Search), modbo algorithm (Expand Search), modeling algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
elements model » element model (Expand Search), elements mges (Expand Search), elements over (Expand Search)
level » levels (Expand Search)
-
1
-
2
-
3
-
4
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20
Algorithmic experimental parameter design.
Published 2024“…This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.</p></div>…”