بدائل البحث:
complement based » complement past (توسيع البحث), complement cascade (توسيع البحث), complement system (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
complement based » complement past (توسيع البحث), complement cascade (توسيع البحث), complement system (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
421
Possible graph filter functions.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
422
The notational conventions used in this paper.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
423
Data Sheet 1_Beyond the current state of just-in-time adaptive interventions in mental health: a qualitative systematic review.pdf
منشور في 2025"…To accomplish this, JITAIs often apply complex analytic techniques, such as machine learning or Bayesian algorithms to real- or near-time data acquired from smartphones and other sensors. …"
-
424
-
425
DataSheet1_Enhancing slope stability prediction through integrated PCA-SSA-SVM modeling: a case study of LongLian expressway.docx
منشور في 2024"…Traditional slope stability analysis methods, such as the limit equilibrium method, limit analysis method, and finite element method, often face limitations due to computational complexity and the need for extensive soil property data. …"
-
426
-
427
Overall framework design.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
428
Gamma distribution of reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
429
Top 5 correlated features based on reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
430
Features with the top importance score.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
431
Data Sheet 1_Image-assisted textural analysis of plagioclase crystals in volcanic rocks: an application to lavas erupted on 2021 at Pacaya volcano, Guatemala.docx
منشور في 2025"…In this study, we have processed X-ray maps of major elements from the 2021 basaltic lava rocks of Pacaya volcano (Guatemala) through the Quantitative X-ray Map Analyzer (Q-XRMA) software. …"
-
432
-
433
Intuitionistic fuzzy number .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
434
Experimental message into the integer.
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
435
Triangular .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
436
Graphical representation of triangular 0.6- .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
437
Graphical representation of .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
438
Bayesian Inference of Vector Autoregressions with Tensor Decompositions
منشور في 2025"…Secondly, to obtain interpretable margins, we propose an interweaving algorithm to improve the mixing of margins and identify the margins using a post-processing procedure. …"
-
439
-
440
Data Sheet 1_Evaluating the effectiveness of AI-enhanced “One Body, Two Wings” pharmacovigilance models in China: a nationwide survey on medication safety and risk management.pdf...
منشور في 2025"…However, the study concludes that successful AI integration is predicated on a robust information systems infrastructure, which the data identified as the most critical foundational element. …"