Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
time processing » image processing (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
wt algorithm » _ algorithm (Expand Search), ii algorithm (Expand Search), rf algorithm (Expand Search)
models using » model using (Expand Search)
elements wt » elements _ (Expand Search), elements b (Expand Search), elements fe (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
time processing » image processing (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
wt algorithm » _ algorithm (Expand Search), ii algorithm (Expand Search), rf algorithm (Expand Search)
models using » model using (Expand Search)
elements wt » elements _ (Expand Search), elements b (Expand Search), elements fe (Expand Search)
-
1
-
2
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
3
Optimization process of BO algorithm.
Published 2024“…Bayesian optimization (BO) algorithms, including BO—Gaussian Process, BO—Random Forest, and Random Search methods, were used to refine the XGBoost model architecture. …”
-
4
The run time for each algorithm in seconds.
Published 2025“…We find evidence that the generalised GLS-KGR algorithm is well-suited to such time-series applications, outperforming several standard techniques on this dataset.…”
-
5
-
6
BM3D algorithmic process.
Published 2025“…To enhance image clarity, we applied noise reduction using the BM3D algorithm. We employed an improved UNet network model that incorporates SimAM and PSA modules, forming three attention mechanisms: TandemAT-UNet, ParallelAT-UNet, and NestedAT-UNet. …”
-
7
Processed results from ECG data with the P-T algorithm.
Published 2025“…Reverse polar transformed spectrogram images such as (d) were used to train, validate, and test the deep CNN models in our study.…”
-
8
-
9
-
10
Detection maps obtained using different algorithms for the AVIRIS-II dataset.
Published 2025Subjects: -
11
Detection maps obtained using different algorithms for the Grand Isle dataset.
Published 2025Subjects: -
12
Detection maps obtained using different algorithms for the AVIRIS-I dataset.
Published 2025Subjects: -
13
Detection maps obtained using different algorithms for the abu-urban-3 dataset.
Published 2025Subjects: -
14
Detection maps obtained using different algorithms for the abu-beach-2 dataset.
Published 2025Subjects: -
15
-
16
Algorithm design.
Published 2024“…<div><p>This study aims to improve the helicopter electric power inspection process by using the feature embedding convolution (FEC) model to solve the problems of small scope and poor real-time inspection. …”
-
17
-
18
-
19
-
20