Showing 61 - 80 results of 12,039 for search '(( element method algorithm ) OR ((( based model algorithm ) OR ( data processing algorithm ))))', query time: 0.51s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Scatter diagram of different principal elements. by Jizhong Wang (7441697)

    Published 2025
    “…Finally, a transformer diagnostic model based on SSA-LightGBM was constructed, and the ten fold cross validation method was used to verify the classification ability of the model. …”
  5. 65
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74

    Solution results of different algorithms. by Meilin Zhu (688698)

    Published 2025
    “…Finally, the correctness of the model is analyzed through numerical experiments, and the effectiveness of the proposed algorithm, the joint distribution strategy, and the disruption event processing idea of combining immediate processing and scheduled batch processing is analyzed. …”
  15. 75
  16. 76
  17. 77
  18. 78

    Prediction of pharmaceuticals occurrence based on sales data and Machine learning algorithms. by Júlia Bijos (14489543)

    Published 2025
    “…<p dir="ltr"><b>anvisa2014_2020</b>: This is a pre processed data from the sales data of industrial pharmaceuticals from SNGPC, Brazil's data.…”
  19. 79

    The run time for each algorithm in seconds. by Edward Antonian (21453161)

    Published 2025
    “…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …”
  20. 80

    Data after data processing. by Jiaqi Wang (369548)

    Published 2025
    “…Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”