Showing 141 - 160 results of 4,110 for search '(( data processing algorithm ) OR ((( develop masld algorithm ) OR ( element method algorithm ))))', query time: 0.60s Refine Results
  1. 141
  2. 142
  3. 143

    Solution results of different algorithms. by Meilin Zhu (688698)

    Published 2025
    “…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
  4. 144

    Politus Dataset: A Political Public Opinion Dataset from Turkish Social Media Processed by Privacy-Preserving Artificial Intelligence Algorithms by Erdem Yörük (20428418)

    Published 2024
    “…<p dir="ltr">The Politus Dataset is a large-scale dataset designed to analyze political public opinion in Turkey, created from social media data on X (formerly Twitter) and processed using privacy-preserving artificial intelligence algorithms.…”
  5. 145
  6. 146

    Overview of the ROI determination algorithm. by Virgil Christian Garcia Castillo (19688355)

    Published 2024
    Subjects: “…morphological image processing…”
  7. 147
  8. 148

    S1 Data - by Zhengyu Xu (8550660)

    Published 2025
    Subjects:
  9. 149
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154

    The weight optimization process. by Guomei Cui (20721578)

    Published 2025
    “…However, the training data of this model comes from the simulation environment, which may deviate from the real game data. …”
  15. 155
  16. 156

    Evaluation of model aggregation algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  17. 157

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  18. 158
  19. 159
  20. 160