بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
pre processing » time processing (توسيع البحث), _ processing (توسيع البحث), rna processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
pre processing » time processing (توسيع البحث), _ processing (توسيع البحث), rna processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
781
Statistic Result of <i>Naïve Bayes Classifier.</i>
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
782
Statistic Result of Support Vector Classifier.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
783
Confusion Matrix for Support Vector Classifier.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
784
Naïve Bayes Classifier Confusion Matrix.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
785
Performance Table for ML Models.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
786
The Basic architecture of the model.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
787
Training -validation accuracy & lost for ANN.
منشور في 2025"…This paper emphasizes the importance of data cleaning, pre-processing, and applying appropriate methodologies to transform raw data into a valuable resource that can be utilized by ML and AI models. …"
-
788
-
789
DataSheet1_Enhancing slope stability prediction through integrated PCA-SSA-SVM modeling: a case study of LongLian expressway.docx
منشور في 2024"…Traditional slope stability analysis methods, such as the limit equilibrium method, limit analysis method, and finite element method, often face limitations due to computational complexity and the need for extensive soil property data. …"
-
790
-
791
Overall framework design.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
792
Gamma distribution of reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
793
Top 5 correlated features based on reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
794
Features with the top importance score.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
795
Data Sheet 1_Image-assisted textural analysis of plagioclase crystals in volcanic rocks: an application to lavas erupted on 2021 at Pacaya volcano, Guatemala.docx
منشور في 2025"…In this study, we have processed X-ray maps of major elements from the 2021 basaltic lava rocks of Pacaya volcano (Guatemala) through the Quantitative X-ray Map Analyzer (Q-XRMA) software. …"
-
796
-
797
Intuitionistic fuzzy number .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
798
Experimental message into the integer.
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
799
Triangular .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
800
Graphical representation of triangular 0.6- .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"