يعرض 1,041 - 1,060 نتائج من 2,574 نتيجة بحث عن '(( element method algorithm ) OR ((( data code algorithm ) OR ( data making algorithm ))))', وقت الاستعلام: 0.38s تنقيح النتائج
  1. 1041

    Description of data sources. حسب Gowtham A. Rao (8261928)

    منشور في 2025
    "…<div><p>Objective</p><p>This paper introduces a novel framework for evaluating phenotype algorithms (PAs) using the open-source tool, Cohort Diagnostics.…"
  2. 1042
  3. 1043

    Set of SML-HUIs. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  4. 1044

    Sorted sensitive leaf nodes of SML-HUIs. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  5. 1045

    Database after processed itemset <i>XEDC</i>. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  6. 1046

    A sample transaction database. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  7. 1047

    Discovered ML-HUIs from the database in Table 1. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  8. 1048

    Database after processed itemset <i>XEDC</i>. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  9. 1049

    <i>MC</i>% ratios at different abstraction levels <i>l</i>. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  10. 1050

    Runtime comparison when varying <i>ξ</i>. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  11. 1051

    External utilities of items from Table 1. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  12. 1052

    Runtime comparison when varying <i>SP</i>. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  13. 1053

    <i>MC</i>% ratios when varying <i>SP</i>% and keeping <i>ξ</i> fixed. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  14. 1054

    <i>MC</i>% ratios when varying <i>ξ</i> and keeping <i>SP</i>% fixed. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  15. 1055

    Ablation study visualization results. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"
  16. 1056

    Experimental parameter configuration. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"
  17. 1057

    FLMP-YOLOv8 identification results. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"
  18. 1058

    C2f structure. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"
  19. 1059

    Experimental environment configuration. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"
  20. 1060

    Ablation experiment results table. حسب Xiaozhou Feng (2918222)

    منشور في 2025
    "…To address data collection challenge, this paper proposes a novel feature recognition and detection method for pine wilt disease-infected trees based on an FLMP-YOLOv8 algorithm. …"