بدائل البحث:
modeling algorithm » making algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
data modeling » data modelling (توسيع البحث), data models (توسيع البحث)
developing a » developing new (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
modeling algorithm » making algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
data modeling » data modelling (توسيع البحث), data models (توسيع البحث)
developing a » developing new (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
Evaluation of model aggregation algorithms.
منشور في 2024"…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …"
-
6
-
7
-
8
-
9
-
10
-
11
Types of machine learning algorithms.
منشور في 2024"…Thus, the objectives of this study are to develop an appropriate model for predicting the risk of undernutrition and identify its influencing predictors among under-five children in Bangladesh using explainable machine learning algorithms.…"
-
12
-
13
-
14
Model-Based Clustering of Categorical Data Based on the Hamming Distance
منشور في 2024"…<p>A model-based approach is developed for clustering categorical data with no natural ordering. …"
-
15
-
16
Algorithm process.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
17
Algorithm comparison.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
18
Algorithm comparison.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
19
-
20
Comparison of homomorphic encryption algorithms.
منشور في 2024"…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …"