Search alternatives:
encoding algorithm » finding algorithm (Expand Search), cosine algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search), data recording (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
element » elements (Expand Search)
encoding algorithm » finding algorithm (Expand Search), cosine algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search), data recording (Expand Search)
based mining » based binding (Expand Search), based training (Expand Search), based imaging (Expand Search)
element » elements (Expand Search)
-
21
-
22
-
23
-
24
-
25
-
26
-
27
-
28
-
29
-
30
-
31
Convergence curve of the DBO algorithm.
Published 2025“…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
-
32
Element model generation method with geometric distribution errors
Published 2025“…The product surface geometric distribution error is directly attached to the element nodes of the product ideal element model using the error surface reconstruction method and the replacement algorithm of the element node vector height based on the product’s point cloud data. …”
-
33
Results of association rule mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
34
Results of frequent itemset mining.
Published 2025“…<div><p>In the new model of China’s dual-circulation economy, the opening-up and deepening of financial markets have imposed higher requirements on the risk management capacity of financial institutions, with the issue of loan customers losing contact and defaulting becoming an urgent concern. Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …”
-
35
-
36
(HSCRC) encoding scheme.
Published 2024“…<div><p>Loss-less data compression becomes the need of the hour for effective data compression and computation in VLSI test vector generation and testing in addition to hardware AI/ML computations. …”
-
37
-
38
-
39
-
40