Showing 1 - 20 results of 6,369 for search '(( element data algorithm ) OR ((( data processing algorithm ) OR ( applied using algorithm ))))', query time: 0.49s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Comparison of different optimization algorithms. by Hang Zhao (143592)

    Published 2025
    Subjects: “…crayfish optimization algorithm…”
  6. 6

    Credit Card Fraud Classification Using Applied Machine Learning – A Comparative Study of 24 ML Algorithms by Kelechi Amamba (21022064)

    Published 2025
    “…<p dir="ltr">Credit Card Fraud Classification Using Applied Machine Learning – A Comparative Study of 24 ML Algorithms</p><p dir="ltr">This study describes an empirical evaluation of 24 machine learning models, including Logistic Regression, Decision Trees, Random Forests, Support Vector Machines and Neural Networks using a highly imbalanced fraud dataset that reflects the real-world where the data was culled from. …”
  7. 7

    Processed results from ECG data with the P-T algorithm. by Daehyun Kwon (11985629)

    Published 2025
    “…<p>(a) ECG time series after applying the P-T algorithm, (b) spectrogram, (c) polar spectrogram, and (d) reverse polar spectrogram. …”
  8. 8

    Screening criteria applied for the study selection process. by Yong Lin Lai (20854961)

    Published 2025
    Subjects: “…underlying degradation processes…”
  9. 9
  10. 10
  11. 11

    The run time for each algorithm in seconds. by Edward Antonian (21453161)

    Published 2025
    “…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …”
  12. 12

    DataSheet1_Applying neural network algorithms to ascertain reported experiences of violence in routine mental healthcare records and distributions of reports by diagnosis.pdf by Ava J. C. Mason (19571008)

    Published 2025
    “…Further development of these algorithms could usefully capture broader experiences, such as differentiating more efficiently between witnessed, perpetrated and experienced violence and broader violence experiences like emotional abuse.…”
  13. 13

    Schematic diagram of the experimental algorithm. by Ronghua Meng (20978441)

    Published 2025
    “…Second, the egg carrier structure is designed, the material properties are analysed, and key parameters such as deformation are simulated by SolidWorks and Ansys Workbench. Finite element and fatigue analyses are carried out for the key parameters of the structure, and deformation, fatigue and other data that appear in the actual operation process are obtained. …”
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Data after data processing. by Jiaqi Wang (369548)

    Published 2025
    “…Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”