Search alternatives:
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
from mining » from timing (Expand Search), from examining (Expand Search), from drinking (Expand Search)
method algorithm » network algorithm (Expand Search), means algorithm (Expand Search), mean algorithm (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
elements method » element method (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
from mining » from timing (Expand Search), from examining (Expand Search), from drinking (Expand Search)
-
1
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
2
Algorithmic experimental parameter design.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
3
Spatial spectrum estimation for three algorithms.
Published 2024“…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
-
4
-
5
-
6
-
7
-
8
External utilities of items from Table 1.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
9
Data set - Exploring YouTube’s Algorithmic Patterns in K-Pop Album Video Recommendations
Published 2025“…<p dir="ltr">The data were collected using a snowball sampling technique on YouTube, starting from specific K-pop album-related keywords and following the chain of recommended videos generated by the platform. …”
-
10
Discovered ML-HUIs from the database in Table 1.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
11
-
12
-
13
Anonymised dataset of random accessions from the Wildbase Pathology Register.
Published 2025Subjects: -
14
-
15
Scatter diagram of different principal elements.
Published 2025“…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
-
16
-
17
-
18
-
19
-
20