Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
element » elements (Expand Search)
-
61
-
62
-
63
Convergence curve of the DBO algorithm.
Published 2025“…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
-
64
-
65
Element model generation method with geometric distribution errors
Published 2025“…The product surface geometric distribution error is directly attached to the element nodes of the product ideal element model using the error surface reconstruction method and the replacement algorithm of the element node vector height based on the product’s point cloud data. …”
-
66
-
67
-
68
-
69
Results of association rule mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
70
Results of frequent itemset mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
71
-
72
-
73
Dataset for Fine-Tuning Code Generation Models: Kannada-English Algorithmic Statements and Python Code
Published 2025“…The data is stored in JSON format under the following labels:</p><ul><li><b>"kannada text"</b> – Kannada algorithmic statement</li><li><b>"text"</b> – English algorithmic statement</li><li><b>"code"</b> – Expected Python output</li></ul><h4><b>Dataset Highlights: -</b></h4><ul><li><b>Triplet Structure:</b> Kannada algorithmic statements, their English translations, and Python code.…”
-
74
-
75
-
76
Optimization-Driven Steganographic System Based on Fused Maps and Blowfish Encryption
Published 2025Subjects: -
77
-
78
-
79
-
80