يعرض 1 - 20 نتائج من 10,013 نتيجة بحث عن '(( elements method algorithm ) OR ((( data using algorithm ) OR ( from mining algorithm ))))', وقت الاستعلام: 0.56s تنقيح النتائج
  1. 1

    Sanitized databases using MLHProtector algorithm. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  2. 2

    Algorithmic experimental parameter design. حسب Chuanxi Xing (20141665)

    منشور في 2024
    "…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
  3. 3

    Spatial spectrum estimation for three algorithms. حسب Chuanxi Xing (20141665)

    منشور في 2024
    "…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
  4. 4

    Convergence curves for all algorithms. حسب Genliang Li (5816264)

    منشور في 2025
    الموضوعات:
  5. 5
  6. 6
  7. 7
  8. 8

    External utilities of items from Table 1. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  9. 9

    Data set - Exploring YouTube’s Algorithmic Patterns in K-Pop Album Video Recommendations حسب Grace Abelia Jacob (22126900)

    منشور في 2025
    "…<p dir="ltr">The data were collected using a snowball sampling technique on YouTube, starting from specific K-pop album-related keywords and following the chain of recommended videos generated by the platform. …"
  10. 10

    Discovered ML-HUIs from the database in Table 1. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …"
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Scatter diagram of different principal elements. حسب Jizhong Wang (7441697)

    منشور في 2025
    "…<div><p>A fault diagnosis method for oil immersed transformers based on principal component analysis and SSA LightGBM is proposed to address the problem of low diagnostic accuracy caused by the complexity of current oil immersed transformer faults. Firstly, data on dissolved gases in oil is collected, and a 17 dimensional fault feature matrix is constructed using the uncoded ratio method. …"
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20