Showing 141 - 160 results of 3,993 for search '(( element update algorithm ) OR ((( data processing algorithm ) OR ( level coding algorithm ))))', query time: 0.62s Refine Results
  1. 141
  2. 142
  3. 143
  4. 144

    Solution results of different algorithms. by Meilin Zhu (688698)

    Published 2025
    “…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
  5. 145

    Politus Dataset: A Political Public Opinion Dataset from Turkish Social Media Processed by Privacy-Preserving Artificial Intelligence Algorithms by Erdem Yörük (20428418)

    Published 2024
    “…<p dir="ltr">The Politus Dataset is a large-scale dataset designed to analyze political public opinion in Turkey, created from social media data on X (formerly Twitter) and processed using privacy-preserving artificial intelligence algorithms.…”
  6. 146
  7. 147

    Overview of the ROI determination algorithm. by Virgil Christian Garcia Castillo (19688355)

    Published 2024
    Subjects: “…morphological image processing…”
  8. 148
  9. 149

    S1 Data - by Zhengyu Xu (8550660)

    Published 2025
    Subjects:
  10. 150
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155

    The weight optimization process. by Guomei Cui (20721578)

    Published 2025
    “…However, the training data of this model comes from the simulation environment, which may deviate from the real game data. …”
  16. 156
  17. 157

    Evaluation of model aggregation algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  18. 158

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  19. 159
  20. 160