بدائل البحث:
three functional » state functional (توسيع البحث), from functional (توسيع البحث), based functional (توسيع البحث)
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
python function » protein function (توسيع البحث)
algorithm a » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithms _ (توسيع البحث)
a function » _ function (توسيع البحث)
three functional » state functional (توسيع البحث), from functional (توسيع البحث), based functional (توسيع البحث)
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
python function » protein function (توسيع البحث)
algorithm a » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithms _ (توسيع البحث)
a function » _ function (توسيع البحث)
-
161
-
162
-
163
-
164
-
165
Core genes were selected through PPI analysis based on three algorithms.
منشور في 2024"…<p>Among 46 DEGs whose expression significantly changed in A549 and BEAS-2B cell lines, the core genes were selected using three algorithms: MCC, MNC, and DEGREE. …"
-
166
Benchmark test function results.
منشور في 2025"…Finally, the Cauchy-Gaussian mutation strategy is utilized to prevent the algorithm from falling into local traps. These three steps enable LLSKSO to achieve a dynamic balance between local and global search. …"
-
167
-
168
-
169
Table3_Predicting Human Protein Subcellular Locations by Using a Combination of Network and Function Features.XLSX
منشور في 2021"…The computational prediction of protein subcellular localizations can be performed on the basis of the sequence and the functional characteristics. In this study, the protein–protein interaction network, functional annotation of proteins and a group of direct proteins with known subcellular localization were used to construct models. …"
-
170
-
171
-
172
Hash function construct used in SKINNY-tk3-hash.
منشور في 2024"…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …"
-
173
-
174
-
175
A detailed process of iterative simulation coupled with bone density algorithm; (a) a function of stimulus and related bone density changes, and (b) iterative calculations of finite element analysis coupled with user’s subroutine for changes in bone density.
منشور في 2025"…<p>A detailed process of iterative simulation coupled with bone density algorithm; (a) a function of stimulus and related bone density changes, and (b) iterative calculations of finite element analysis coupled with user’s subroutine for changes in bone density.…"
-
176
-
177
-
178
-
179
Image 3_Construction of a right ventricular function assessment model in patients undergoing invasive mechanical ventilation based on VExUS grading and the classification and regression tree algorithm.pdf
منشور في 2025"…Objective<p>Investigate the correlation between right ventricular function ultrasound indicators and the Venous Excess Ultrasound (VExUS) grading system in patients undergoing invasive mechanical ventilation (IMV), and develop a right ventricular function assessment model using VExUS grading and the Classification and Regression Tree (CART) algorithm.…"
-
180