بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
developing a » developing new (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
mesh algorithm » best algorithm (توسيع البحث), mean algorithm (توسيع البحث), means algorithm (توسيع البحث)
developing a » developing new (توسيع البحث)
element mesh » element method (توسيع البحث), elements mges (توسيع البحث), element te (توسيع البحث)
a algorithm » _ algorithm (توسيع البحث), b algorithm (توسيع البحث), _ algorithms (توسيع البحث)
-
1
Algorithm process.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
2
-
3
-
4
Training process of HFKG-RFE algorithm.
منشور في 2025"…The training of the knowledge graph embedding model is similar to that of many models, which requires a large amount of data for learning to achieve the purpose of model development. …"
-
5
-
6
Automatic generation of mesh diagrams.
منشور في 2025"…Finite element and fatigue analyses are carried out for the key parameters of the structure, and deformation, fatigue and other data that appear in the actual operation process are obtained. …"
-
7
-
8
-
9
Evaluation of model aggregation algorithms.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
10
Comparison of homomorphic encryption algorithms.
منشور في 2024"…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …"
-
11
-
12
-
13
Algorithms runtime comparison.
منشور في 2025"…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …"
-
14
The process of using the M.E.D.V.I.S. algorithm.
منشور في 2025"…All are placed into three dimensionality reduction methods, which are then processed in a k-means clustering algorithm with k = 2 to represent good and bad figures. …"
-
15
-
16
-
17
-
18
Solution results of different algorithms.
منشور في 2025"…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …"
-
19
-
20