Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
element update » element data (Expand Search)
developing a » developing new (Expand Search)
a algorithm » _ algorithm (Expand Search), b algorithm (Expand Search), _ algorithms (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
element update » element data (Expand Search)
developing a » developing new (Expand Search)
a algorithm » _ algorithm (Expand Search), b algorithm (Expand Search), _ algorithms (Expand Search)
-
1
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
2
-
3
-
4
Training process of HFKG-RFE algorithm.
Published 2025“…The training of the knowledge graph embedding model is similar to that of many models, which requires a large amount of data for learning to achieve the purpose of model development. …”
-
5
-
6
-
7
-
8
Evaluation of model aggregation algorithms.
Published 2024“…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
-
9
Comparison of homomorphic encryption algorithms.
Published 2024“…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
-
10
-
11
-
12
Algorithms runtime comparison.
Published 2025“…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
-
13
The process of using the M.E.D.V.I.S. algorithm.
Published 2025“…All are placed into three dimensionality reduction methods, which are then processed in a k-means clustering algorithm with k = 2 to represent good and bad figures. …”
-
14
-
15
-
16
-
17
Solution results of different algorithms.
Published 2025“…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
-
18
-
19
-
20