بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
complement rast » complement past (توسيع البحث), complement 5a (توسيع البحث), complement rim4 (توسيع البحث)
rast algorithm » best algorithm (توسيع البحث), forest algorithm (توسيع البحث), based algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
complement rast » complement past (توسيع البحث), complement 5a (توسيع البحث), complement rim4 (توسيع البحث)
rast algorithm » best algorithm (توسيع البحث), forest algorithm (توسيع البحث), based algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
461
-
462
-
463
Overall framework design.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
464
Gamma distribution of reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
465
Top 5 correlated features based on reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
466
Features with the top importance score.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
467
-
468
<b>AI for imaging plant stress in invasive species </b>(dataset from the article https://doi.org/10.1093/aob/mcaf043)
منشور في 2025"…Machine learning regression algorithms were trained to predict betalain accumulation from digital images, outperforming classic spectroradiometer measurements. …"
-
469
S1 Graphical abstract -
منشور في 2025"…The software uses a shape-detection algorithm to single out and track the movement of pillars’ tips for the most common shapes of EHT platforms. …"
-
470
The architecture of the SE-multi-input CNN model.
منشور في 2025"…The fusion strategy combines feature maps via bicubic interpolation and element-wise summation to maintain spatial integrity. …"
-
471
Confusion matrix for the Multi-input CNN model.
منشور في 2025"…The fusion strategy combines feature maps via bicubic interpolation and element-wise summation to maintain spatial integrity. …"
-
472
Confusion matrices for single-input CNN models.
منشور في 2025"…The fusion strategy combines feature maps via bicubic interpolation and element-wise summation to maintain spatial integrity. …"
-
473
Confusion matrix for the Multi-input CNN model.
منشور في 2025"…The fusion strategy combines feature maps via bicubic interpolation and element-wise summation to maintain spatial integrity. …"
-
474
Steps to the final sample.
منشور في 2025"…<div><p>One major obstacle to advancing research and treatment for major psychiatric disorders is their substantial within-diagnosis heterogeneity in patient lifetime trajectories. Adapted research methods such as cluster analysis to define subgroups of patients are currently used. …"
-
475
-
476
Intuitionistic fuzzy number .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
477
Experimental message into the integer.
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
478
Triangular .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
479
Graphical representation of triangular 0.6- .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
480
Graphical representation of .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"