Search alternatives:
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
develop box » develop low (Expand Search), develop post (Expand Search), develop next (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
develop box » develop low (Expand Search), develop post (Expand Search), develop next (Expand Search)
-
41
-
42
List of the time used by each algorithm.
Published 2024“…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
-
43
Sanitized databases using MLHProtector algorithm.
Published 2025“…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
-
44
-
45
-
46
-
47
-
48
-
49
Example of S-box.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
50
-
51
-
52
-
53
-
54
The mAP for all algorithms and 80% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 80% of the data used for training.</p>…”
-
55
The mAP for all algorithms and 50% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 50% of the data used for training.</p>…”
-
56
The mAP for all algorithms and 60% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 60% of the data used for training.</p>…”
-
57
Point cloud data registration using the original ICP algorithm.
Published 2025“…<p>Point cloud data registration using the original ICP algorithm.…”
-
58
-
59
-
60