يعرض 341 - 360 نتائج من 448 نتيجة بحث عن '(((( element data algorithm ) OR ( query processing algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.51s تنقيح النتائج
  1. 341

    Yellow River Basin Industrial Base Spatio-temporal Monitoring and Impact Assessment Dataset حسب Libing Wang (21723566)

    منشور في 2025
    "…The dataset aggregates data elements and core algorithm codes that underpin the key research stages of the paper, with a focus on demonstrating and reproducing the innovative methodologies employed, rather than directly sharing sensitive raw data or precise measurement values.…"
  2. 342
  3. 343

    Data Sheet 1_ARGContextProfiler: extracting and scoring the genomic contexts of antibiotic resistance genes using assembly graphs.pdf حسب Nazifa Ahmed Moumi (7434359)

    منشور في 2025
    "…Several tools, databases, and algorithms are now available to facilitate the identification of ARGs in metagenomic sequencing data; however, direct annotation of short-read data provides limited contextual information. …"
  4. 344
  5. 345

    Practical implementation of an End-to-end methodology for SPC of 3-D part geometry: A case study حسب Yulin An (833223)

    منشور في 2025
    "…<p>Del Castillo and Zhao have recently proposed a new methodology for the Statistical Process Control (SPC) of discrete parts whose 3-dimensional (3D) geometrical data are acquired with non-contact sensors. The approach is based on monitoring the spectrum of the Laplace–Beltrami (LB) operator of each scanned part estimated using finite element methods (FEM). …"
  6. 346

    Possible graph filter functions. حسب Edward Antonian (21453161)

    منشور في 2025
    "…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
  7. 347

    The notational conventions used in this paper. حسب Edward Antonian (21453161)

    منشور في 2025
    "…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
  8. 348

    Data Sheet 1_Beyond the current state of just-in-time adaptive interventions in mental health: a qualitative systematic review.pdf حسب Claire R. van Genugten (20626733)

    منشور في 2025
    "…To accomplish this, JITAIs often apply complex analytic techniques, such as machine learning or Bayesian algorithms to real- or near-time data acquired from smartphones and other sensors. …"
  9. 349
  10. 350

    DataSheet1_Enhancing slope stability prediction through integrated PCA-SSA-SVM modeling: a case study of LongLian expressway.docx حسب Jianxin Huang (11944014)

    منشور في 2024
    "…Traditional slope stability analysis methods, such as the limit equilibrium method, limit analysis method, and finite element method, often face limitations due to computational complexity and the need for extensive soil property data. …"
  11. 351
  12. 352
  13. 353

    Data Sheet 1_Image-assisted textural analysis of plagioclase crystals in volcanic rocks: an application to lavas erupted on 2021 at Pacaya volcano, Guatemala.docx حسب Roberto Visalli (8152251)

    منشور في 2025
    "…In this study, we have processed X-ray maps of major elements from the 2021 basaltic lava rocks of Pacaya volcano (Guatemala) through the Quantitative X-ray Map Analyzer (Q-XRMA) software. …"
  14. 354
  15. 355

    Intuitionistic fuzzy number . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  16. 356

    Experimental message into the integer. حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  17. 357

    Triangular . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  18. 358

    Graphical representation of triangular 0.6- . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  19. 359

    Graphical representation of . حسب Hanan Alolaiyan (18536236)

    منشور في 2024
    "…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
  20. 360

    Bayesian Inference of Vector Autoregressions with Tensor Decompositions حسب Yiyong Luo (6170300)

    منشور في 2025
    "…Secondly, to obtain interpretable margins, we propose an interweaving algorithm to improve the mixing of margins and identify the margins using a post-processing procedure. …"