Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based method » based methods (Expand Search)
element » elements (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
based method » based methods (Expand Search)
element » elements (Expand Search)
-
161
Computation time as a function of the sample size on the random graph dataset.
Published 2024Subjects: -
162
F1 score of edges selected through cross-validation on the chain graph dataset.
Published 2024Subjects: -
163
-
164
Examples of ground-truth graph structures with (<i>p</i>, <i>n</i><sub>≠0</sub>) = (10, 10).
Published 2024Subjects: -
165
Number of edges selected through cross-validation on the chain graph dataset.
Published 2024Subjects: -
166
Number of edges selected through cross-validation on the random graph dataset.
Published 2024Subjects: -
167
-
168
-
169
Computation time as a function of the number of variables on the chain graph dataset.
Published 2024Subjects: -
170
Computation time as a function of the number of variables on the random graph dataset.
Published 2024Subjects: -
171
-
172
F1 score of edges selected through cross-validation on the random graph dataset.
Published 2024Subjects: -
173
Issues with automatic and team-based QC.
Published 2025“…<p>When maintaining large neuroimaging datasets with multiple processing pipelines, shallow quality control processes that rely on derived metrics can fail to catch instances of algorithmic failures. …”
-
174
Data Sheet 1_Research on persimmon fruit diameter accurate detection method based on improved RCNN instance segmentation algorithm.zip
Published 2025“…<p>Aiming at the problem of inaccurate fruit recognition and fruit diameter detection in the persimmon inspection process, this research proposes a novel persimmon accurate recognition and fruit diameter detection algorithm based on the Region-based Convolutional Neural Network (RCNN) Mask and instance segmentation algorithm. …”
-
175
-
176
C4.5 establishment process of C4.5 DT model.
Published 2025“…Additionally, the impact of SCs on individuals’ mythical experiences is investigated.</p><p>Methods</p><p>An information security analysis model based on the combination of KMC and DT algorithms is established. …”
-
177
Fire monitoring process.
Published 2025“…<div><p>Ensuring safety and safeguarding indoor properties require reliable fire detection methods. Traditional detection techniques that use smoke, heat, or fire sensors often fail due to false positives and slow response time. …”
-
178
-
179
-
180
Comparison table of filter algorithm parameters.
Published 2025“…Experimental results show that using an optimized dehazing processing method on industrial images affected by water fog achieves an average PSNR of 34.9 dB and an SSIM of 0.951. …”