Showing 1 - 20 results of 10,567 for search '(( data processing algorithm ) OR ((( developing _ algorithm ) OR ( element data algorithm ))))', query time: 0.31s Refine Results
  1. 1

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…<div><p>With the rapid development of smart grids, power grid systems are becoming increasingly complex, posing significant challenges to their security. …”
  2. 2
  3. 3
  4. 4

    Comparison of different optimization algorithms. by Hang Zhao (143592)

    Published 2025
    Subjects: “…crayfish optimization algorithm…”
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    The run time for each algorithm in seconds. by Edward Antonian (21453161)

    Published 2025
    “…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …”
  10. 10
  11. 11

    Schematic diagram of the experimental algorithm. by Ronghua Meng (20978441)

    Published 2025
    “…Second, the egg carrier structure is designed, the material properties are analysed, and key parameters such as deformation are simulated by SolidWorks and Ansys Workbench. Finite element and fatigue analyses are carried out for the key parameters of the structure, and deformation, fatigue and other data that appear in the actual operation process are obtained. …”
  12. 12

    Evaluation of model aggregation algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  13. 13

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20