بدائل البحث:
developing modeling » developing models (توسيع البحث)
modeling algorithm » making algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
developing modeling » developing models (توسيع البحث)
modeling algorithm » making algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
Feature selection using Boruta algorithm.
منشور في 2025"…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…"
-
12
-
13
-
14
Types of machine learning algorithms.
منشور في 2024"…<div><p>Background and objectives</p><p>Child undernutrition is a leading global health concern, especially in low and middle-income developing countries, including Bangladesh. Thus, the objectives of this study are to develop an appropriate model for predicting the risk of undernutrition and identify its influencing predictors among under-five children in Bangladesh using explainable machine learning algorithms.…"
-
15
Comparison of different optimization algorithms.
منشور في 2025الموضوعات: "…crayfish optimization algorithm…"
-
16
Performance of models by different algorithms.
منشور في 2025"…To facilitate early diagnosis and intervention, this study aims to develop an efficient and reliable prediction model for MASLD using machine learning algorithm.…"
-
17
-
18
-
19
Algorithm process.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
20
Algorithm comparison.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"