Showing 1 - 20 results of 14,075 for search '(( data using algorithm ) OR ((( development _ algorithm ) OR ( element data algorithm ))))', query time: 0.50s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Technological Fitness and Coherence explanation. Schematic representation of the workings of the Fitness and Complexity algorithm and Coherence diversification. by Matteo Straccamore (15083799)

    Published 2025
    “…<p>In the top panel, we show the computation of the Fitness and Complexity algorithm. The Fitness of the entity <i>e</i><sub>1</sub> is the technological Complexity sum of all the technology done by <i>e</i><sub>1</sub>. …”
  7. 7

    Comparison of different optimization algorithms. by Hang Zhao (143592)

    Published 2025
    Subjects: “…crayfish optimization algorithm…”
  8. 8
  9. 9
  10. 10

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  11. 11
  12. 12
  13. 13
  14. 14

    Feature selection using Boruta algorithm. by Shayla Naznin (13014015)

    Published 2025
    “…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…”
  15. 15
  16. 16

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  17. 17

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  18. 18

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  19. 19

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  20. 20

    DMTD algorithm. by Yunhu Huang (21402795)

    Published 2025
    Subjects: