Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
data processing » image processing (Expand Search)
develop based » developed based (Expand Search), develop masld (Expand Search), development based (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
data processing » image processing (Expand Search)
develop based » developed based (Expand Search), develop masld (Expand Search), development based (Expand Search)
-
361
-
362
-
363
Ranking of ML algorithms.
Published 2025“…For this purpose, well-known Machine Learning (ML) algorithms such as Random Forest (RF), Adaptive Boosting (AB), and Gradient Boosting (GB) were utilized. …”
-
364
-
365
-
366
-
367
-
368
-
369
-
370
-
371
-
372
-
373
-
374
-
375
-
376
-
377
-
378
Data process.
Published 2024“…They highlighted an important number of ethical issues which could be grouped into five overarching categories: goal relevance, adverse side effects, role of employees, data process, and vagueness. Their inputs were remarkably coherent with the issues highlighted in the academic literature. …”
-
379
-
380
Example of byte substitution Process.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”