Search alternatives:
developing finding » developing inside (Expand Search), developing offspring (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
developing finding » developing inside (Expand Search), developing offspring (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
element data » settlement data (Expand Search), relevant data (Expand Search), movement data (Expand Search)
-
1
-
2
-
3
-
4
Comparison of different optimization algorithms.
Published 2025Subjects: “…crayfish optimization algorithm…”
-
5
-
6
Feature selection using Boruta algorithm.
Published 2025“…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…”
-
7
Algorithm process.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
8
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
9
Algorithm comparison.
Published 2025“…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
-
10
-
11
-
12
Algorithmic experimental parameter design.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
13
-
14
-
15
Spatial spectrum estimation for three algorithms.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
16
-
17
-
18
-
19
-
20
XGBoost odor prediction model: finding the structure-odor relationship of odorant molecules using the extreme gradient boosting algorithm
Published 2024“…With the recent developments in machine learning (ML) technology, ML and data analytic techniques are significantly being used for quantitative structure-activity relationship (QSAR) in the chemistry domain toward knowledge discovery where the traditional Edisonian methods have not been useful. …”