Showing 161 - 180 results of 4,326 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( data boruta algorithm ))))', query time: 0.63s Refine Results
  1. 161
  2. 162
  3. 163

    Solution results of different algorithms. by Meilin Zhu (688698)

    Published 2025
    “…Firstly, from the perspective of data-driven, it crawls the historical data of driving speed through Baidu map big data platform, and uses a BP neural network optimized by genetic algorithm to predict the driving speed of vehicles in different periods. …”
  4. 164

    Politus Dataset: A Political Public Opinion Dataset from Turkish Social Media Processed by Privacy-Preserving Artificial Intelligence Algorithms by Erdem Yörük (20428418)

    Published 2024
    “…<p dir="ltr">The Politus Dataset is a large-scale dataset designed to analyze political public opinion in Turkey, created from social media data on X (formerly Twitter) and processed using privacy-preserving artificial intelligence algorithms.…”
  5. 165
  6. 166

    Overview of the ROI determination algorithm. by Virgil Christian Garcia Castillo (19688355)

    Published 2024
    Subjects: “…morphological image processing…”
  7. 167
  8. 168

    S1 Data - by Zhengyu Xu (8550660)

    Published 2025
    Subjects:
  9. 169
  10. 170
  11. 171
  12. 172
  13. 173
  14. 174
  15. 175

    The weight optimization process. by Guomei Cui (20721578)

    Published 2025
    “…However, the training data of this model comes from the simulation environment, which may deviate from the real game data. …”
  16. 176
  17. 177

    Evaluation of model aggregation algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  18. 178

    Comparison of homomorphic encryption algorithms. by JiaMing Wang (334865)

    Published 2024
    “…This algorithm leverages a federated learning architecture and combines it with Paillier homomorphic encryption technology to ensure the security of the training process. …”
  19. 179
  20. 180