Showing 1 - 20 results of 11,680 for search '(( element method algorithm ) OR ((( data using algorithm ) OR ( models finding algorithm ))))', query time: 0.54s Refine Results
  1. 1
  2. 2

    The run time for each algorithm in seconds. by Edward Antonian (21453161)

    Published 2025
    “…We find evidence that the generalised GLS-KGR algorithm is well-suited to such time-series applications, outperforming several standard techniques on this dataset.…”
  3. 3

    ML algorithms used in this study. by Toheeb Salahudeen (21368040)

    Published 2025
    “…Notably, including mitochondrial peptides alongside clinical factors significantly enhances predictive capability, shedding light on the interplay between depression severity and mitochondrial oxidative stress pathways. These findings underscore the potential for machine learning models to aid clinical assessment, particularly in individuals with comorbid conditions such as hypertension, diabetes mellitus, and cardiovascular disease.…”
  4. 4
  5. 5
  6. 6

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  7. 7

    XGBoost odor prediction model: finding the structure-odor relationship of odorant molecules using the extreme gradient boosting algorithm by Pankaj Tyagi (20147683)

    Published 2024
    “…With the recent developments in machine learning (ML) technology, ML and data analytic techniques are significantly being used for quantitative structure-activity relationship (QSAR) in the chemistry domain toward knowledge discovery where the traditional Edisonian methods have not been useful. …”
  8. 8

    A* Path-Finding Algorithm to Determine Cell Connections by Max Weng (22327159)

    Published 2025
    “…</p><p dir="ltr">Astrocytes were dissociated from E18 mouse cortical tissue, and image data were processed using a Cellpose 2.0 model to mask nuclei. …”
  9. 9

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  10. 10

    Feature selection using Boruta algorithm. by Shayla Naznin (13014015)

    Published 2025
    “…Feature selection was performed using the Boruta algorithm and model performance was evaluated by comparing accuracy, precision, recall, F1 score, MCC, Cohen’s Kappa and AUROC.…”
  11. 11
  12. 12
  13. 13

    Model comparison between our model-free algorithm (here MF*) and SARSA. by Carlos A. Velázquez-Vargas (19751567)

    Published 2024
    “…We evaluated the models in the data of Experiment 1 and Experiment 2 using AIC and BIC differences and testing if they were different from zero using the Wilcoxon signed-rank test. …”
  14. 14
  15. 15
  16. 16
  17. 17

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  18. 18

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  19. 19

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  20. 20