بدائل البحث:
mining algorithm » finding algorithm (توسيع البحث), making algorithm (توسيع البحث), training algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mining » element mapping (توسيع البحث), element bonding (توسيع البحث), element modeling (توسيع البحث)
complement ii » complement i (توسيع البحث), complement _ (توسيع البحث), complement 5a (توسيع البحث)
ii algorithm » _ algorithm (توسيع البحث), _ algorithms (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
mining algorithm » finding algorithm (توسيع البحث), making algorithm (توسيع البحث), training algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
element mining » element mapping (توسيع البحث), element bonding (توسيع البحث), element modeling (توسيع البحث)
complement ii » complement i (توسيع البحث), complement _ (توسيع البحث), complement 5a (توسيع البحث)
ii algorithm » _ algorithm (توسيع البحث), _ algorithms (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
121
Fault detection capability of RECO and DMRC.
منشور في 2024"…Concurrent error detection (CED) techniques, sometimes referred to as fault detection techniques, are extensively employed to enhance the dependability of embedded devices. Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …"
-
122
One SKINNY encryption round.
منشور في 2024"…Concurrent error detection (CED) techniques, sometimes referred to as fault detection techniques, are extensively employed to enhance the dependability of embedded devices. Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …"
-
123
Truth table for self-dual function.
منشور في 2024"…Concurrent error detection (CED) techniques, sometimes referred to as fault detection techniques, are extensively employed to enhance the dependability of embedded devices. Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …"
-
124
Hash function construct used in SKINNY-tk3-hash.
منشور في 2024"…Concurrent error detection (CED) techniques, sometimes referred to as fault detection techniques, are extensively employed to enhance the dependability of embedded devices. Two fault detection approaches are proposed to detect faults in cryptographic algorithms running on IoT devices. …"
-
125
Data Sheet 1_Past and future trends in swiss snow cover: multi-decades analysis using the snow observation from space algorithm.docx
منشور في 2025"…This study addresses this gap by employing two products—the monthly NDSI (Normalized Difference Snow Index) and snow cover products—derived from the Snow Observation from Space (SOfS) algorithm to monitor snow cover dynamics across Switzerland over the past 37 years. …"
-
126
Supplementary file 1_Past and future trends in swiss snow cover: multi-decades analysis using the snow observation from space algorithm.docx
منشور في 2025"…This study addresses this gap by employing two products—the monthly NDSI (Normalized Difference Snow Index) and snow cover products—derived from the Snow Observation from Space (SOfS) algorithm to monitor snow cover dynamics across Switzerland over the past 37 years. …"
-
127
Comparative Performance Metrics of AESs.
منشور في 2025"…The study employed an IELTS-adapted speaking test, assessed simultaneously by AESs and human raters, with scoring alignment analyzed through intra-class correlation coefficients, Pearson correlations, and linear regression. Results revealed that two systems demonstrated strong agreement with human ratings, while the third exhibited systematic score inflation, likely due to algorithmic discrepancies and limited consideration of nuanced language features. …"
-
128
Score Distributions by Rater.
منشور في 2025"…The study employed an IELTS-adapted speaking test, assessed simultaneously by AESs and human raters, with scoring alignment analyzed through intra-class correlation coefficients, Pearson correlations, and linear regression. Results revealed that two systems demonstrated strong agreement with human ratings, while the third exhibited systematic score inflation, likely due to algorithmic discrepancies and limited consideration of nuanced language features. …"
-
129
Descriptive Statistics for Human Raters and AESs.
منشور في 2025"…The study employed an IELTS-adapted speaking test, assessed simultaneously by AESs and human raters, with scoring alignment analyzed through intra-class correlation coefficients, Pearson correlations, and linear regression. Results revealed that two systems demonstrated strong agreement with human ratings, while the third exhibited systematic score inflation, likely due to algorithmic discrepancies and limited consideration of nuanced language features. …"
-
130
-
131
TreeMap 2016 Stand Size Code Field (Image Service)
منشور في 2024"…<div>TreeMap 2016 provides a tree-level model of the forests of the conterminous United States.…"
-
132
-
133
-
134
Code and data for evaluating oil spill amount from text-form incident information
منشور في 2025"…<h2>Dataset and Code Description</h2><p dir="ltr">This repository includes the code and data for evaluating oil spill amounts from incident textual information. …"
-
135
Supporting data for "Interpreting complex ecological patterns and processes across differentscales using Artificial Intelligence"
منشور في 2025"…<p dir="ltr">This thesis bridges the gap between field observations and the empirical understanding of ecological systems by applying AI models at different spatial scales and hierarchical levels to study ecological complexity. The detailed implementation, source code and demo dataset are included in dedicated folders for each chapter.…"
-
136
A bi-agent single-processor scheduling to minimize the sum of maximum lateness with release dates
منشور في 2025"…It is complemented by a heuristic algorithm based on Earliest Due Date List-Revising, providing an initial upper bound. …"
-
137
-
138
Description of data sources.
منشور في 2025"…<div><p>Objective</p><p>This paper introduces a novel framework for evaluating phenotype algorithms (PAs) using the open-source tool, Cohort Diagnostics.…"
-
139
-
140