بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
elements method » element method (توسيع البحث)
complement ipca » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
ipca algorithm » wgcna algorithm (توسيع البحث), cscap algorithm (توسيع البحث), ii algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
elements method » element method (توسيع البحث)
complement ipca » complement 5a (توسيع البحث), complement c3 (توسيع البحث), complement c5 (توسيع البحث)
ipca algorithm » wgcna algorithm (توسيع البحث), cscap algorithm (توسيع البحث), ii algorithm (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
461
-
462
-
463
Overall framework design.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
464
Gamma distribution of reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
465
Top 5 correlated features based on reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
466
Features with the top importance score.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
467
-
468
<b>AI for imaging plant stress in invasive species </b>(dataset from the article https://doi.org/10.1093/aob/mcaf043)
منشور في 2025"…Machine learning regression algorithms were trained to predict betalain accumulation from digital images, outperforming classic spectroradiometer measurements. …"
-
469
S1 Graphical abstract -
منشور في 2025"…The software uses a shape-detection algorithm to single out and track the movement of pillars’ tips for the most common shapes of EHT platforms. …"
-
470
Steps to the final sample.
منشور في 2025"…<div><p>One major obstacle to advancing research and treatment for major psychiatric disorders is their substantial within-diagnosis heterogeneity in patient lifetime trajectories. Adapted research methods such as cluster analysis to define subgroups of patients are currently used. …"
-
471
The architecture of the SE-multi-input CNN model.
منشور في 2025"…In this work, we propose a novel arrhythmia classification algorithm based on a multi-input convolutional neural network (CNN) enhanced with a Squeeze-and-Excitation (SE) attention mechanism. …"
-
472
Confusion matrix for the Multi-input CNN model.
منشور في 2025"…In this work, we propose a novel arrhythmia classification algorithm based on a multi-input convolutional neural network (CNN) enhanced with a Squeeze-and-Excitation (SE) attention mechanism. …"
-
473
Confusion matrices for single-input CNN models.
منشور في 2025"…In this work, we propose a novel arrhythmia classification algorithm based on a multi-input convolutional neural network (CNN) enhanced with a Squeeze-and-Excitation (SE) attention mechanism. …"
-
474
Confusion matrix for the Multi-input CNN model.
منشور في 2025"…In this work, we propose a novel arrhythmia classification algorithm based on a multi-input convolutional neural network (CNN) enhanced with a Squeeze-and-Excitation (SE) attention mechanism. …"
-
475
Intuitionistic fuzzy number .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
476
Experimental message into the integer.
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
477
Triangular .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
478
Graphical representation of triangular 0.6- .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
479
Graphical representation of .
منشور في 2024"…In addition, the practical effect of the proposed methods is also investigated in this study. A mathematical mechanism is presented to implement the t-intuitionistic fuzzy RSA algorithm. …"
-
480