Showing 141 - 160 results of 14,883 for search '(( movement data algorithm ) OR ((( data using algorithm ) OR ( system using algorithm ))))', query time: 0.66s Refine Results
  1. 141
  2. 142

    The structure of genetic algorithm (GA). by Ali Akbar Moosavi (17769033)

    Published 2024
    “…Then, radial basis functions (RBFNNs), multilayer perceptron (MLPNNs), hybrid genetic algorithm (GA-NNs), and particle swarm optimization (PSO-NNs) neural networks were utilized to develop PTFs and compared their accuracy with the traditional regression model (MLR) using statistical indices. …”
  3. 143
  4. 144
  5. 145

    Training algorithm flow. by Xing Chen (140292)

    Published 2024
    “…<div><p>In daily life, two common algorithms are used for collecting medical disease data: data integration of medical institutions and questionnaires. …”
  6. 146

    Data Sheet 1_Closing the loop: establishing an autonomous test-learn cycle to optimize induction of bacterial systems using a robotic platform.pdf by Jan Benedict Spannenkrebs (20595722)

    Published 2025
    “…Robotic platforms can be used to automate this task and provide sufficiently large and reproducible data sets including provenance. …”
  7. 147
  8. 148

    Algorithm process. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  9. 149

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  10. 150

    Algorithm comparison. by Wei Cui (92129)

    Published 2025
    “…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …”
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155
  16. 156
  17. 157
  18. 158
  19. 159
  20. 160