Search alternatives:
constructs algorithm » reconstruction algorithm (Expand Search), reconstruction algorithms (Expand Search), control algorithm (Expand Search)
selected constructs » selected districts (Expand Search), oriented constructs (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
constructs algorithm » reconstruction algorithm (Expand Search), reconstruction algorithms (Expand Search), control algorithm (Expand Search)
selected constructs » selected districts (Expand Search), oriented constructs (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
levels using » level using (Expand Search), models using (Expand Search), cells using (Expand Search)
-
1
-
2
-
3
-
4
-
5
Important indicators selection model evaluation.
Published 2025“…Therefore, this article uses the random forest model and XGBoost algorithm to identify core price indicators, and uses an innovative rolling NAR dynamic neural network model to simulate and predict second-hand sailboat price data. …”
-
6
Decision maker preference and scheme selection.
Published 2025“…The improved NSGA-II algorithm is used to solve the Pareto front efficiently, and the search efficiency is improved by the elite reservation strategy and the congestion adaptive adjustment mechanism. …”
-
7
-
8
-
9
-
10
-
11
Algorithm for constructing Boot-t CIs.
Published 2024“…Next, we select the gamma distribution as the prior distribution and apply the Lindley approximation algorithm to calculate `estimates of Shannon entropy and Rényi entropy under different loss functions including Linex loss function, entropy loss function, and DeGroot loss function respectively. …”
-
12
-
13
-
14
-
15
-
16
-
17
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
18
-
19
-
20