Search alternatives:
encoding algorithm » finding algorithm (Expand Search), cosine algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
making algorithm » learning algorithm (Expand Search), finding algorithm (Expand Search), means algorithm (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search), data recording (Expand Search)
data making » data backing (Expand Search), data mining (Expand Search), data tracking (Expand Search)
element » elements (Expand Search)
encoding algorithm » finding algorithm (Expand Search), cosine algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
making algorithm » learning algorithm (Expand Search), finding algorithm (Expand Search), means algorithm (Expand Search)
data encoding » data including (Expand Search), data according (Expand Search), data recording (Expand Search)
data making » data backing (Expand Search), data mining (Expand Search), data tracking (Expand Search)
element » elements (Expand Search)
-
201
Sanitized databases using MLHProtector algorithm.
Published 2025“…The insights gained from higher abstraction levels are somewhat more valuable than those from lower levels since they contain the outlines of the data. To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
202
Safe Policy Learning through Extrapolation: Application to Pre-trial Risk Assessment
Published 2025“…Our goal is to analyze data from a unique field experiment on an algorithmic pre-trial risk assessment to investigate whether the scores and recommendations can be improved. …”
-
203
Flowchart of algorithm principles.
Published 2025“…First, the Lasso algorithm and Pearson correlation coefficient method are applied to screen key multi-source features from wind turbine operation and maintenance data, quantifying their dynamic correlations with power output. …”
-
204
-
205
Evaluation of model aggregation algorithms.
Published 2024“…Finally, the paper designs a deep learning model based on two-dimensional convolutional neural networks and bidirectional gated recurrent units (2DCNN-BIGRU) to handle incomplete data features and missing labels in network traffic data. …”
-
206
Comparison of homomorphic encryption algorithms.
Published 2024“…Finally, the paper designs a deep learning model based on two-dimensional convolutional neural networks and bidirectional gated recurrent units (2DCNN-BIGRU) to handle incomplete data features and missing labels in network traffic data. …”
-
207
-
208
-
209
AUW-CE Mining Algorithms & Dataset Hub
Published 2025“…Although various pruning strategies have been proposed to enhance mining efficiency, they cannot adaptively adjust based on the characteristics of the data distribution, making them difficult to apply widely across different datasets. …”
-
210
-
211
Deep Discrete Encoders: Identifiable Deep Generative Models for Rich Data with Discrete Latent Layers
Published 2025“…Motivated by this, we propose interpretable deep generative models for rich data types with discrete latent layers, called <i>Deep Discrete Encoders</i> (DDEs). …”
-
212
-
213
-
214
-
215
-
216
-
217
-
218
-
219
Quadratic velocity elements.
Published 2025“…To enhance the precision of the proposed UB finite element method using a reduced element count, this study implements a mesh adaptation algorithm grounded in plastic dissipation. …”
-
220
Quadratic velocity elements.
Published 2025“…To enhance the precision of the proposed UB finite element method using a reduced element count, this study implements a mesh adaptation algorithm grounded in plastic dissipation. …”