Search alternatives:
developing learner » developing gender (Expand Search), developing larvae (Expand Search), developing market (Expand Search)
learner algorithm » learning algorithm (Expand Search), learning algorithms (Expand Search), search algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
element based » engagement based (Expand Search)
developing learner » developing gender (Expand Search), developing larvae (Expand Search), developing market (Expand Search)
learner algorithm » learning algorithm (Expand Search), learning algorithms (Expand Search), search algorithm (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
element based » engagement based (Expand Search)
-
1
-
2
-
3
Comparison of different optimization algorithms.
Published 2025Subjects: “…crayfish optimization algorithm…”
-
4
-
5
-
6
-
7
-
8
Risk element category diagram.
Published 2025“…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …”
-
9
-
10
Scatter diagram of different principal elements.
Published 2025“…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
11
-
12
List of the time used by each algorithm.
Published 2024“…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …”
-
13
-
14
Sanitized databases using MLHProtector algorithm.
Published 2025“…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …”
-
15
-
16
-
17
-
18
The mAP for all algorithms and 80% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 80% of the data used for training.</p>…”
-
19
The mAP for all algorithms and 50% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 50% of the data used for training.</p>…”
-
20
The mAP for all algorithms and 60% of the data used for training.
Published 2024“…<p>The mAP for all algorithms and 60% of the data used for training.</p>…”