بدائل البحث:
implement modeling » element modeling (توسيع البحث), element modelling (توسيع البحث)
modeling algorithm » making algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), finding algorithm (توسيع البحث), routing algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
implement modeling » element modeling (توسيع البحث), element modelling (توسيع البحث)
modeling algorithm » making algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), finding algorithm (توسيع البحث), routing algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
1941
Table 1_The pre- and post-COVID-19 pandemic dengue fever patterns in southeastern coastal China in 2019 and 2024: molecular evolution and strain replacement.docx
منشور في 2025"…Recombination was analyzed using seven detection algorithms implemented in RDP4. Hamming distances were used to profile amino acid substitutions. …"
-
1942
Table 2_The pre- and post-COVID-19 pandemic dengue fever patterns in southeastern coastal China in 2019 and 2024: molecular evolution and strain replacement.docx
منشور في 2025"…Recombination was analyzed using seven detection algorithms implemented in RDP4. Hamming distances were used to profile amino acid substitutions. …"
-
1943
Data Sheet 1_Testing the applicability of a governance checklist for high-risk AI-based learning outcome assessment in Italian universities under the EU AI act annex III.pdf
منشور في 2025"…This creates accountability gaps affecting student rights and educational equity, as institutions lack systematic tools to demonstrate that algorithmic assessment systems produce valid and fair outcomes.…"
-
1944
Image 1_The pre- and post-COVID-19 pandemic dengue fever patterns in southeastern coastal China in 2019 and 2024: molecular evolution and strain replacement.pdf
منشور في 2025"…Recombination was analyzed using seven detection algorithms implemented in RDP4. Hamming distances were used to profile amino acid substitutions. …"
-
1945
Microscopic Detection and Quantification of Microplastic Particles in Environmental Water Samples
منشور في 2025"…Phase contrast microscopy (Zeiss, 10X objective) was employed to capture high-resolution images. Image processing algorithms, implemented in Python using adaptive thresholding techniques, were applied to segment particles from the background. …"
-
1946
Table 1_Whole genome analysis of Shigella sp. JZ001: a novel strain isolated from diarrheic suckling mice.docx
منشور في 2025"…Phylogenetic reconstruction was performed using maximum-likelihood algorithms implemented in MEGA.</p>Results<p>Rotavirus-SA11 infected suckling mice exhibited watery feces 4 days post-infection. …"
-
1947
Detecting Deception with Emotion -The Role of Emotional AI in Combating Social Engineering Attacks by Stephen Mikah Makoshi
منشور في 2025"…</p><p dir="ltr">To support real-world adoption, the paper presents a detailed implementation framework covering:</p><ul><li>Data collection and multimodal input analysis</li><li>Machine learning model training and customization</li><li>Integration with SIEM and behavioral analytics tools</li><li>Ethical governance and compliance safeguards</li><li>Pilot testing and continuous system improvement</li></ul><p dir="ltr">Finally, the manuscript concludes that Emotional AI is not a replacement for traditional cybersecurity systems, but a <b>strategic augmentation</b>—a tool that strengthens the "human firewall" by equipping systems with the emotional awareness necessary to detect and disrupt socially engineered cyber threats.…"
-
1948
Core data
منشور في 2025"…We divided the dataset into training and test sets, using 70% of the genes for training and 30% for testing. We implemented machine learning algorithms using the following R packages: rpart for Decision Trees, gbm for Gradient Boosting Machines (GBM), ranger for Random Forests, the glm function for Generalized Linear Models (GLM), and xgboost for Extreme Gradient Boosting (XGB). …"
-
1949
Climate anomalies due to Cerrado native vegetation loss
منشور في 2024"…</li></ul><p dir="ltr"><b>Code/software</b></p><p dir="ltr">To analyze the CSV files in your dataset, you can use various software options, such as R and Microsoft Excel. …"