بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
mining algorithm » finding algorithm (توسيع البحث), making algorithm (توسيع البحث), training algorithms (توسيع البحث)
elements method » element method (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
from mining » from timing (توسيع البحث), from examining (توسيع البحث), from drinking (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
mining algorithm » finding algorithm (توسيع البحث), making algorithm (توسيع البحث), training algorithms (توسيع البحث)
elements method » element method (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
from mining » from timing (توسيع البحث), from examining (توسيع البحث), from drinking (توسيع البحث)
-
1
Sanitized databases using MLHProtector algorithm.
منشور في 2025"…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
-
2
Algorithmic experimental parameter design.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
3
Spatial spectrum estimation for three algorithms.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
4
-
5
-
6
-
7
-
8
External utilities of items from Table 1.
منشور في 2025"…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
-
9
Data set - Exploring YouTube’s Algorithmic Patterns in K-Pop Album Video Recommendations
منشور في 2025"…<p dir="ltr">The data were collected using a snowball sampling technique on YouTube, starting from specific K-pop album-related keywords and following the chain of recommended videos generated by the platform. …"
-
10
Discovered ML-HUIs from the database in Table 1.
منشور في 2025"…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
-
11
-
12
-
13
Anonymised dataset of random accessions from the Wildbase Pathology Register.
منشور في 2025الموضوعات: -
14
-
15
Scatter diagram of different principal elements.
منشور في 2025"…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …"
-
16
-
17
-
18
-
19
-
20