بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
management based » management use (توسيع البحث), management system (توسيع البحث), management a (توسيع البحث)
data processing » image processing (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
management based » management use (توسيع البحث), management system (توسيع البحث), management a (توسيع البحث)
data processing » image processing (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
-
21
The relevant code in the manuscript can be found in the supporting information data file.
منشور في 2025الموضوعات: -
22
-
23
-
24
iFAD∞ and other flow direction algorithms with test data
منشور في 2025"…<p dir="ltr">The Java codes for all the drainage direction algorithms used in the study entitled “A New Multiple Flow Direction Algorithm for Determining Limited Dispersive Domain Based on Flow Aggregation Technique” are provided as an Eclipse Java project. …"
-
25
-
26
-
27
-
28
-
29
-
30
The CGO risk prediction process based on data augmentation and neuroevolution.
منشور في 2025الموضوعات: -
31
-
32
-
33
Reflection matrix microscopy data and CLASS algorithms
منشور في 2025"…<h3><b>Reflection matrix microscopy data and CLASS algorithms</b></h3><p dir="ltr">This software package includes essential algorithms for reflection matrix microscope (RMM) and the CLASS algorithm. …"
-
34
Data after data processing.
منشور في 2025"…Based on desensitized samples of lost-linking customers (with multidimensional features such as communication behavior and loan qualifications), this study uses the FP-Growth algorithm to systematically mine association rules between loss-of-contact features and three modes: “Hide and Seek”, “Flee with the Money”, and “False Disappearance”, providing effective risk management strategies for financial institutions. …"
-
35
-
36
-
37
-
38
-
39
-
40