بدائل البحث:
custom algorithm » fusion algorithm (توسيع البحث), control algorithm (توسيع البحث), lasso algorithm (توسيع البحث)
complement based » complement past (توسيع البحث), complement cascade (توسيع البحث), complement system (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
element » elements (توسيع البحث)
custom algorithm » fusion algorithm (توسيع البحث), control algorithm (توسيع البحث), lasso algorithm (توسيع البحث)
complement based » complement past (توسيع البحث), complement cascade (توسيع البحث), complement system (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
element » elements (توسيع البحث)
-
141
Supporting data for "Interpreting complex ecological patterns and processes across differentscales using Artificial Intelligence"
منشور في 2025"…<p dir="ltr">This thesis bridges the gap between field observations and the empirical understanding of ecological systems by applying AI models at different spatial scales and hierarchical levels to study ecological complexity. The detailed implementation, source code and demo dataset are included in dedicated folders for each chapter.…"
-
142
A bi-agent single-processor scheduling to minimize the sum of maximum lateness with release dates
منشور في 2025"…It is complemented by a heuristic algorithm based on Earliest Due Date List-Revising, providing an initial upper bound. …"
-
143
-
144
Description of data sources.
منشور في 2025"…<div><p>Objective</p><p>This paper introduces a novel framework for evaluating phenotype algorithms (PAs) using the open-source tool, Cohort Diagnostics.…"
-
145
-
146
-
147
High-Throughput Mass Spectral Library Searching of Small Molecules in R with NIST MSPepSearch
منشور في 2025"…Despite the availability of numerous library search algorithms, those developed by NIST and implemented in MS Search remain predominant, partly because commercial databases (e.g., NIST, Wiley) are distributed in proprietary formats inaccessible to custom code. …"
-
148
SpeLL: An Agent for Natural Language-Driven Intelligent Spectral Modeling
منشور في 2025"…The core strength of SpeLL lies in its dual RAG pathways. The Code RAG provides specialized code knowledge for spectral data analysis, enabling the LLM to generate robust and domain-specific analytical scripts that address the implementation and optimization of algorithms. …"
-
149
-
150
-
151
-
152
Butterfly unit for CT/GS/MM operation.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
153
NTT operations in MDC2NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
154
TW management in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
155
NTT/INTT/PWM operations in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
156
Coefficient access scheme in MDC4NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
157
Read Write operations in memory-based FIFOs.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
158
PWM calculations broken into simpler operations.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
159
TW management in MDC2NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"
-
160
INTT operations in MDC2NIP.
منشور في 2025"…<div><p>CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. …"