Showing 1 - 20 results of 9,697 for search '(( data using algorithm ) OR ((( developing dbo algorithm ) OR ( settlement data algorithm ))))', query time: 0.57s Refine Results
  1. 1
  2. 2

    The schematic diagram of the hierarchical clustering algorithm. by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  3. 3
  4. 4
  5. 5

    The silhouette coefficient scores for different algorithms at various levels. by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  6. 6

    Flowchart of DBO. by Faten K. Karim (20314631)

    Published 2024
    “…Previous research found that metaheuristics can dramatically increase CC performance if deployed as scheduling algorithms. Therefore, this study develops an evolutionary algorithm-based scheduling approach for makespan optimization and resource utilization (EASA-MORU) technique in the cloud environment. …”
  7. 7
  8. 8

    Data types and sources. by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  9. 9
  10. 10
  11. 11
  12. 12

    Spatial distribution level results. by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  13. 13

    Classification of accessibility levels. by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  14. 14
  15. 15

    S1 File - by Xiaojie Feng (6873953)

    Published 2025
    Subjects: “…original multidimensional data…”
  16. 16
  17. 17

    List of the time used by each algorithm. by JiaMing Gong (20427837)

    Published 2024
    “…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
  18. 18

    Sanitized databases using MLHProtector algorithm. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
  19. 19
  20. 20