Search alternatives:
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
from mining » from timing (Expand Search), from examining (Expand Search), from drinking (Expand Search)
mining algorithm » finding algorithm (Expand Search), making algorithm (Expand Search), training algorithms (Expand Search)
using algorithm » using algorithms (Expand Search), routing algorithm (Expand Search), fusion algorithm (Expand Search)
data algorithm » data algorithms (Expand Search), update algorithm (Expand Search), atlas algorithm (Expand Search)
from mining » from timing (Expand Search), from examining (Expand Search), from drinking (Expand Search)
-
1
Sanitized databases using MLHProtector algorithm.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
2
-
3
-
4
Data Sheet 1_Predicting place of delivery choice among childbearing women in East Africa: a comparative analysis of advanced machine learning techniques.pdf
Published 2024“…A comparative analysis of 12 advanced machine learning algorithms was conducted, utilizing various data balancing techniques and hyperparameter optimization methods to enhance model performance.…”
-
5
Data Sheet 2_Predicting place of delivery choice among childbearing women in East Africa: a comparative analysis of advanced machine learning techniques.pdf
Published 2024“…A comparative analysis of 12 advanced machine learning algorithms was conducted, utilizing various data balancing techniques and hyperparameter optimization methods to enhance model performance.…”
-
6
-
7
-
8
-
9
-
10
-
11
-
12
Summary of relevant works.
Published 2025“…This paper presents a UAV-BPL synchronization algorithm that uses the farm’s existing electrical grid via Broadband over Power Line (BPL) communication to enable cost-effective, scalable data collection. …”
-
13
-
14
-
15
External utilities of items from Table 1.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
16
Data set - Exploring YouTube’s Algorithmic Patterns in K-Pop Album Video Recommendations
Published 2025“…<p dir="ltr">The data were collected using a snowball sampling technique on YouTube, starting from specific K-pop album-related keywords and following the chain of recommended videos generated by the platform. …”
-
17
-
18
-
19
Discovered ML-HUIs from the database in Table 1.
Published 2025“…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
-
20