Search alternatives:
implementing context » implementation context (Expand Search), implementing change (Expand Search)
context algorithm » control algorithm (Expand Search), monte algorithm (Expand Search), consistent algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
implementing context » implementation context (Expand Search), implementing change (Expand Search)
context algorithm » control algorithm (Expand Search), monte algorithm (Expand Search), consistent algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
-
21
Scatter diagram of different principal elements.
Published 2025“…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
22
-
23
List of the time used by each algorithm.
Published 2024“…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
-
24
Sanitized databases using MLHProtector algorithm.
Published 2025“…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
-
25
Comparative Internal and External AUC Performance Across Single-Site Models.
Published 2025Subjects: -
26
-
27
-
28
-
29
Median and IQR of the model AUC values across each study site for internal and external validation.
Published 2025Subjects: -
30
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
-
39
-
40
Data Sheet 1_Human vs. algorithmic auditors: the impact of entity type and ambiguity on human dishonesty.pdf
Published 2025“…This is surprising given the growing implementation of algorithmic systems in institutions, particularly in tax enforcement and financial regulation, to help monitor and identify misreports, or in online labor platforms widely implementing algorithmic control to ensure that workers deliver high service quality. …”