Search alternatives:
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
complement based » complement past (Expand Search), complement cascade (Expand Search), complement system (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
-
1
The relevant data file for this article.
Published 2024“…Users with higher anxiety and loneliness levels are more likely to use the algorithm matching function of virtual social networking, engage in false self-presentation, and have less trust in the platform. …”
-
2
-
3
-
4
-
5
-
6
-
7
-
8
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20