Search alternatives:
learning algorithm » learning algorithms (Expand Search)
elements learning » students learning (Expand Search), elements during (Expand Search)
backing algorithm » tracking algorithm (Expand Search), making algorithm (Expand Search), tracking algorithms (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
elements learning » students learning (Expand Search), elements during (Expand Search)
backing algorithm » tracking algorithm (Expand Search), making algorithm (Expand Search), tracking algorithms (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
-
1
Algorithmic experimental parameter design.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
2
Spatial spectrum estimation for three algorithms.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
3
-
4
Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things
Published 2025“…Then, the data is pre-processed using Variational Bayesian-based Maximum Correntropy Cubature Kalman Filtering (VBMCCKF) of noise removal and data enhancement. …”
-
5
-
6
Comparison between the proposed algorithm and other clustering methods on six datasets (parameter values are in the parentheses).
Published 2025Subjects: “…distributed clustering algorithm…”
-
7
-
8
Clustering results on R15 and MNIST by using FKmeansCB.
Published 2025Subjects: “…distributed clustering algorithm…”
-
9
-
10
Risk element category diagram.
Published 2025“…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …”
-
11
-
12
-
13
-
14
-
15
-
16
-
17
The influence of parameters<i>k1</i> and <i>k2</i> on clustering results.
Published 2025Subjects: “…distributed clustering algorithm…”
-
18
A basic federated clustering framework.
Published 2025Subjects: “…distributed clustering algorithm…”
-
19
-
20