يعرض 281 - 300 نتائج من 9,780 نتيجة بحث عن '(( data using algorithm ) OR ((( element data algorithm ) OR ( complement component algorithm ))))', وقت الاستعلام: 0.51s تنقيح النتائج
  1. 281
  2. 282
  3. 283
  4. 284
  5. 285

    DMTD algorithm. حسب Yunhu Huang (21402795)

    منشور في 2025
    "…Finally, we conducted comparative tests of the manual driving, intelligent driving algorithm (ITOR, STON), and the algorithms proposed in this paper, EITO, using real line data from the Yizhuang Line of Beijing Metro (YLBS). …"
  6. 286

    Convergence curves for all algorithms. حسب Genliang Li (5816264)

    منشور في 2025
    الموضوعات:
  7. 287
  8. 288
  9. 289
  10. 290
  11. 291
  12. 292
  13. 293

    Phases of proposed algorithm. حسب Muhammad Abdullah (3357692)

    منشور في 2025
    "…To address these limitations, this paper proposes a novel diagnostic framework based on Hypersoft Fuzzy Rough Set (HSFRS) theory.This hybrid approach integrates the flexibility of hypersoft sets for modeling multi-parameter relationships, the strength of fuzzy logic in handling vagueness, and the approximation capabilities of rough set theory to manage data uncertainty. Using a pseudo fuzzy binary relation, we define lower and upper approximation operators for fuzzy subsets within the parameter space. …"
  14. 294

    Flowchart of the 3D-NLE-BF algorithm. حسب Haiyan Zhang (176919)

    منشور في 2025
    الموضوعات:
  15. 295

    Algorithm process. حسب Wei Cui (92129)

    منشور في 2025
    "…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
  16. 296

    Algorithm comparison. حسب Wei Cui (92129)

    منشور في 2025
    "…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
  17. 297

    Algorithm comparison. حسب Wei Cui (92129)

    منشور في 2025
    "…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
  18. 298
  19. 299

    Data used for the analyses in this study. حسب Nourin Sultana (22339463)

    منشور في 2025
    "…This study applies and evaluates machine learning (ML) algorithms to predict LBW and identify its key risk factors in Bangladesh. …"
  20. 300