Search alternatives:
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
cc3d algorithm » cscap algorithm (Expand Search), cnn algorithm (Expand Search), wold algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
cc3d algorithm » cscap algorithm (Expand Search), cnn algorithm (Expand Search), wold algorithm (Expand Search)
-
1
-
2
Data Algorithms
Published 2025Subjects: “…Teacher education and professional development of educators…”
-
3
-
4
-
5
-
6
Ranking of ML algorithms.
Published 2025“…For this purpose, well-known Machine Learning (ML) algorithms such as Random Forest (RF), Adaptive Boosting (AB), and Gradient Boosting (GB) were utilized. …”
-
7
-
8
-
9
-
10
Feature selection using Boruta algorithm.
Published 2025“…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…”
-
11
The overview of the ML algorithms’ flowchart.
Published 2025“…For this purpose, well-known Machine Learning (ML) algorithms such as Random Forest (RF), Adaptive Boosting (AB), and Gradient Boosting (GB) were utilized. …”
-
12
-
13
-
14
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
15
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
16
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
17
G R code algorithm.
Published 2024“…The algorithm was developed and coded in Verilog and simulated using Modelsim. …”
-
18
Development of authentication algorithms for IEC 61850 goose and sampled value messages
Published 2025“…<p dir="ltr">This study aims to develop an authentication algorithm for Routable-GOOSE (R-GOOSE) or Routable-SV (R-SV). …”
-
19
Data Sheet 1_Developing decision support algorithm for hypertension medications for use in a digital therapeutic system.pdf
Published 2025“…The decision support algorithm was developed through a literature review of clinical and pharmacokinetic studies and knowledge of the pharmacology of aging (pharmacokinetics and pharmacodynamics). …”
-
20
Data Sheet 2_Developing decision support algorithm for hypertension medications for use in a digital therapeutic system.pdf
Published 2025“…The decision support algorithm was developed through a literature review of clinical and pharmacokinetic studies and knowledge of the pharmacology of aging (pharmacokinetics and pharmacodynamics). …”