Showing 1 - 20 results of 48 for search 'multiple resource interactions algorithm', query time: 0.36s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    IUTF Dataset(Enhanced): Enabling Cross-Border Resource for Analysing the Impact of Rainfall on Urban Transportation Systems by Xuhui Lin (19505503)

    Published 2025
    “…IUTF Dataset: A Cross-Border Resource for Analysing the Impact of Rainfall on Urban Transportation Systems<h2>Description</h2><p dir="ltr">The Integrated Urban Traffic-Flood (IUTF) dataset is a comprehensive, open-access resource that addresses a critical gap in urban transportation and climate resilience research. …”
  12. 12
  13. 13

    Cross-tabulation of study participants by gender. by Ya Shi (3407390)

    Published 2025
    “…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
  14. 14

    ROC curve performance of SWB prediction. by Ya Shi (3407390)

    Published 2025
    “…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
  15. 15

    Predictors of SWB. by Ya Shi (3407390)

    Published 2025
    “…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
  16. 16

    Supplementary Fig 1. by Ya Shi (3407390)

    Published 2025
    “…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
  17. 17

    Overview of LWLCM. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  18. 18

    Key initialization. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  19. 19

    Decryption Time(sec). by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
  20. 20

    Key-Keystream Avalanche effect. by Shahnwaz Afzal (22184546)

    Published 2025
    “…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”