Showing 1 - 20 results of 10,013 for search '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from mining algorithm ))))', query time: 0.68s Refine Results
  1. 1

    Sanitized databases using MLHProtector algorithm. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
  2. 2

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  3. 3

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …”
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    External utilities of items from Table 1. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
  9. 9

    Data set - Exploring YouTube’s Algorithmic Patterns in K-Pop Album Video Recommendations by Grace Abelia Jacob (22126900)

    Published 2025
    “…<p dir="ltr">The data were collected using a snowball sampling technique on YouTube, starting from specific K-pop album-related keywords and following the chain of recommended videos generated by the platform. …”
  10. 10

    Discovered ML-HUIs from the database in Table 1. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Scatter diagram of different principal elements. by Jizhong Wang (7441697)

    Published 2025
    “…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …”
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20