بدائل البحث:
mapping algorithm » making algorithm (توسيع البحث), mining algorithm (توسيع البحث), learning algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mapping » elemental mapping (توسيع البحث), element modeling (توسيع البحث), argument mapping (توسيع البحث)
complement each » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
mapping algorithm » making algorithm (توسيع البحث), mining algorithm (توسيع البحث), learning algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mapping » elemental mapping (توسيع البحث), element modeling (توسيع البحث), argument mapping (توسيع البحث)
complement each » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
61
-
62
Code snippet from “Netty/Buffer” Maven artefact.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
63
-
64
Model code
منشور في 2025"…The latter provides insights into the inherent texture complexity of the image data due to the lossless coding. For classification of leaf surfaces from tree species based on the computed features, we utilized the k-nearest neighbors (kNN) algorithm with k=3. …"
-
65
-
66
-
67
Data Sheet 1_Strategies for population-level identification of post-acute sequelae of COVID-19 through health administrative data.pdf
منشور في 2025"…From each included study, we extracted data on design, algorithms used for outcome identification (sources, coding systems, codes, time criteria/thresholds), and whether significant associations with SARS-CoV-2 infection were reported.…"
-
68
Code snippet from “Apache Dubbo” GitHub project.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
69
Mechanomics Code - JVT
منشور في 2025"…At the beginning of the code, there is a help section that explains how to use it.…"
-
70
Visualization of algorithm detection results.
منشور في 2025"…On the KITTI dataset, our algorithm achieved 3D average detection accuracy (AP3D) of 81.15%, 62.02%, and 58.68% across three difficulty levels. …"
-
71
-
72
-
73
-
74
Parameters of stimuli used in the study.
منشور في 2025"…<div><p>This study introduces a neurobiologically inspired computational model based on the predictive coding algorithm, providing insights into coherent motion detection processes. …"
-
75
-
76
-
77
-
78
-
79
-
80