بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
developing a » developing new (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
developing a » developing new (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
-
1
Algorithm process.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
2
-
3
Comparison of different optimization algorithms.
منشور في 2025الموضوعات: "…crayfish optimization algorithm…"
-
4
-
5
Training process of HFKG-RFE algorithm.
منشور في 2025"…The training of the knowledge graph embedding model is similar to that of many models, which requires a large amount of data for learning to achieve the purpose of model development. …"
-
6
-
7
-
8
The run time for each algorithm in seconds.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
9
-
10
-
11
Schematic diagram of the experimental algorithm.
منشور في 2025"…Second, the egg carrier structure is designed, the material properties are analysed, and key parameters such as deformation are simulated by SolidWorks and Ansys Workbench. Finite element and fatigue analyses are carried out for the key parameters of the structure, and deformation, fatigue and other data that appear in the actual operation process are obtained. …"
-
12
Evaluation of model aggregation algorithms.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
13
Comparison of homomorphic encryption algorithms.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
14
-
15
-
16
-
17
Algorithms runtime comparison.
منشور في 2025"…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …"
-
18
The process of using the M.E.D.V.I.S. algorithm.
منشور في 2025"…All are placed into three dimensionality reduction methods, which are then processed in a k-means clustering algorithm with k = 2 to represent good and bad figures. …"
-
19
-
20
Model-Based Clustering of Categorical Data Based on the Hamming Distance
منشور في 2024"…<p>A model-based approach is developed for clustering categorical data with no natural ordering. …"