Search alternatives:
network algorithm » new algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data finding » path finding (Expand Search), data fitting (Expand Search), case finding (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
network algorithm » new algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), novel algorithm (Expand Search), modbo algorithm (Expand Search)
data finding » path finding (Expand Search), data fitting (Expand Search), case finding (Expand Search)
data code » data model (Expand Search), data came (Expand Search)
-
141
-
142
-
143
-
144
-
145
Topological analysis of COVID-19 wave patterns and policy responses in Europe
Published 2025“…Addressing this crucial gap, this study employs TDA, specifically the Mapper algorithm, to analyze normalized COVID-19 case data, segmented into epidemiological waves, across European countries. …”
-
146
<b>MACEDONIA OS: A Unified Scalar Field-Based Consciousness and Operating System Architecture</b>
Published 2025Subjects: -
147
-
148
-
149
-
150
Code and data for <i>Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms</i>
Published 2024“…<p dir="ltr">Data and code for easy reproducibility of results described in the paper <i>Navigating Time's Possibilities: Plausible Counterfactual Explanations for Multivariate Time-Series Forecast through Genetic Algorithms</i><i>, </i>published on the IEEE TrustCom-2024 (23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications).…”
-
151
-
152
-
153
-
154
Algorithm process.
Published 2025“…Our findings suggest that the proposed method offers a promising solution for real-time intrusion detection in complex power grid environments.…”
-
155
Algorithm comparison.
Published 2025“…Our findings suggest that the proposed method offers a promising solution for real-time intrusion detection in complex power grid environments.…”
-
156
Algorithm comparison.
Published 2025“…Our findings suggest that the proposed method offers a promising solution for real-time intrusion detection in complex power grid environments.…”
-
157
-
158
-
159
-
160