يعرض 421 - 440 نتائج من 610 نتيجة بحث عن '(((( complement based algorithm ) OR ( element data algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.52s تنقيح النتائج
  1. 421

    Possible graph filter functions. حسب Edward Antonian (21453161)

    منشور في 2025
    "…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
  2. 422

    The notational conventions used in this paper. حسب Edward Antonian (21453161)

    منشور في 2025
    "…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
  3. 423

    Data Sheet 1_Beyond the current state of just-in-time adaptive interventions in mental health: a qualitative systematic review.pdf حسب Claire R. van Genugten (20626733)

    منشور في 2025
    "…To accomplish this, JITAIs often apply complex analytic techniques, such as machine learning or Bayesian algorithms to real- or near-time data acquired from smartphones and other sensors. …"
  4. 424
  5. 425

    DataSheet1_Enhancing slope stability prediction through integrated PCA-SSA-SVM modeling: a case study of LongLian expressway.docx حسب Jianxin Huang (11944014)

    منشور في 2024
    "…Traditional slope stability analysis methods, such as the limit equilibrium method, limit analysis method, and finite element method, often face limitations due to computational complexity and the need for extensive soil property data. …"
  6. 426
  7. 427

    Overall framework design. حسب Matthew Yit Hang Yeow (20721206)

    منشور في 2025
    "…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
  8. 428

    Gamma distribution of reuse. حسب Matthew Yit Hang Yeow (20721206)

    منشور في 2025
    "…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
  9. 429

    Top 5 correlated features based on reuse. حسب Matthew Yit Hang Yeow (20721206)

    منشور في 2025
    "…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
  10. 430

    Features with the top importance score. حسب Matthew Yit Hang Yeow (20721206)

    منشور في 2025
    "…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
  11. 431

    Data Sheet 1_Image-assisted textural analysis of plagioclase crystals in volcanic rocks: an application to lavas erupted on 2021 at Pacaya volcano, Guatemala.docx حسب Roberto Visalli (8152251)

    منشور في 2025
    "…In this study, we have processed X-ray maps of major elements from the 2021 basaltic lava rocks of Pacaya volcano (Guatemala) through the Quantitative X-ray Map Analyzer (Q-XRMA) software. …"
  12. 432
  13. 433

    Intuitionistic fuzzy number . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  14. 434

    Experimental message into the integer. حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  15. 435

    Triangular . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  16. 436

    Graphical representation of triangular 0.6- . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  17. 437

    Graphical representation of . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  18. 438

    Bayesian Inference of Vector Autoregressions with Tensor Decompositions حسب Yiyong Luo (6170300)

    منشور في 2025
    "…Secondly, to obtain interpretable margins, we propose an interweaving algorithm to improve the mixing of margins and identify the margins using a post-processing procedure. …"
  19. 439
  20. 440

    Data Sheet 1_Evaluating the effectiveness of AI-enhanced “One Body, Two Wings” pharmacovigilance models in China: a nationwide survey on medication safety and risk management.pdf... حسب Jian Yang (12136)

    منشور في 2025
    "…However, the study concludes that successful AI integration is predicated on a robust information systems infrastructure, which the data identified as the most critical foundational element. …"