Showing 1 - 20 results of 7,601 for search 'a ((selection algorithm) OR (detection algorithm))', query time: 0.33s Refine Results
  1. 1
  2. 2

    Algorithm flow of the IFE method. by Jia Liu (41593)

    Published 2025
    “…For this issue, we proposed a new sensor array optimization algorithm named Interfered Feature Elimination coupled with Feature Group Selection (IFE-FGS). …”
  3. 3

    AUC scores of anomaly detection algorithms. by GaoXiang Zhao (21499525)

    Published 2025
    “…<div><p>Anomaly detection plays a crucial role in fields such as information security and industrial production. …”
  4. 4

    Recall scores of anomaly detection algorithms. by GaoXiang Zhao (21499525)

    Published 2025
    “…<div><p>Anomaly detection plays a crucial role in fields such as information security and industrial production. …”
  5. 5

    Data Sheet 1_IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic.docx by Lizhong Jin (20991293)

    Published 2025
    “…This study addresses these challenges by proposing a novel approach that combines the Improved Gravitational Search Algorithm (IGSA) with the Soft Actor-Critic (SAC) reinforcement learning algorithm, aiming to enhance detection accuracy and computational efficiency.…”
  6. 6
  7. 7
  8. 8
  9. 9

    F1-scores of anomaly detection algorithms. by GaoXiang Zhao (21499525)

    Published 2025
    “…<div><p>Anomaly detection plays a crucial role in fields such as information security and industrial production. …”
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Overview of the Cell2Spatial algorithm. by Huamei Li (8815955)

    Published 2025
    “…<p>The Cell2Spatial framework comprises seven fundamental components: data preprocessing, marker gene selection, similarity matrix construction, hotspot detection, deconvolution and cell count estimation, single-cell (SC) pre-assignment, and final mapping to spots (see “Materials and methods”). …”
  16. 16

    Overview of Algorithm 2. by Hao Zhang (15339)

    Published 2025
    “…Therefore, using unsupervised anomaly detection methods to identify abnormal logs is a meaningful task. …”
  17. 17
  18. 18

    Fitness curves for each algorithm. by Minan Tang (20389941)

    Published 2024
    “…Aiming at the problem of power quality disturbance detection and classification, this paper proposes a novel algorithm based on fast S-transform and crested porcupine optimizer (CPO) optimized CNN. …”
  19. 19
  20. 20

    Flowchart data balancing algorithm (SMOTE). by Xiangting Shi (21439579)

    Published 2025
    “…This article presents the Regularised Memory Graph Attention Capsule Network (RMGACNet), an original architecture aiming at improving fraud detection using Bidirectional Long Short-Term Memory (BiLSTM) networks combined with advanced feature extraction and classification algorithms. …”