Suggested Topics within your search.
Search alternatives:
predictive » prediction (Expand Search)
Showing 1,861 - 1,880 results of 20,616 for search '((predictive OR reduction) OR education) algorithms', query time: 0.29s Refine Results
  1. 1861

    Average Corrosion Rate Prediction Model for Buried Oil and Gas Pipelines Based on SSA-LightGBM by Weigang Fu, Haitao Wang, Kuankuan Zhang, Xia Wang, Kunlun Chen, Chunmei Sun, Zhengwei Wang, Liuyang Song, Niannian Wang

    Published 2025-01-01
    “…Corrosion represents a major cause of damage and leakage in oil and gas pipelines, making accurate corrosion rate prediction critical for operational safety. This study establishes an average corrosion rate prediction model using the Sparrow Search Algorithm-optimized Light Gradient Boosting Machine (SSA-LightGBM). …”
    Get full text
    Article
  2. 1862
  3. 1863
  4. 1864
  5. 1865
  6. 1866

    Systematic Review on Algorithmic Trading by David Jukl, Jan Lansky

    Published 2025-08-01
    “…Background: Algorithmic trading systems (ATS) are defined by the use of computational algorithms for automating financial transactions. …”
    Get full text
    Article
  7. 1867
  8. 1868
  9. 1869
  10. 1870
  11. 1871
  12. 1872
  13. 1873
  14. 1874
  15. 1875

    Advanced machine learning techniques for predicting compressive strength and ultrasonic pulse velocity of concrete incorporating industrial by-products by Ehsan Mohsennia, Alireza Javid, Vahab Toufigh

    Published 2025-07-01
    “…Among the models tested, the CatBoost (CB) algorithm, optimized with the Whale Optimization Algorithm (WOA), exhibited outstanding predictive performance. …”
    Get full text
    Article
  16. 1876

    A novel research on network security situation prediction based on iteratively optimized RBF-NN by Yuqin Wu, Congqi Shen, Shungen Xiao, Wei Feng, Yexian Fan, Xiuzhuang Zhou

    Published 2025-05-01
    “…Abstract Network security situation (NSS) prediction has attracted significant attention in recent years due to its potential to preemptively mitigate various types of network attacks. …”
    Get full text
    Article
  17. 1877
  18. 1878
  19. 1879
  20. 1880