بدائل البحث:
table 1_developing » table 1_development (توسيع البحث), table 2_development (توسيع البحث)
using algorithms » pacing algorithms (توسيع البحث), nine algorithms (توسيع البحث), sorting algorithms (توسيع البحث)
data algorithms » art algorithms (توسيع البحث), all algorithms (توسيع البحث), both algorithms (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
table 1_developing » table 1_development (توسيع البحث), table 2_development (توسيع البحث)
using algorithms » pacing algorithms (توسيع البحث), nine algorithms (توسيع البحث), sorting algorithms (توسيع البحث)
data algorithms » art algorithms (توسيع البحث), all algorithms (توسيع البحث), both algorithms (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
-
1
-
2
Comparison of different optimization algorithms.
منشور في 2025الموضوعات: "…crayfish optimization algorithm…"
-
3
-
4
Algorithmic experimental parameter design.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
5
Spatial spectrum estimation for three algorithms.
منشور في 2024"…The results of numerical simulations and sea trial experimental data indicate that the use of subarrays comprising 5 and 3 array elements, respectively, is sufficient to effectively estimate 12 source angles. …"
-
6
-
7
The run time for each algorithm in seconds.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
8
-
9
-
10
-
11
Risk element category diagram.
منشور في 2025"…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …"
-
12
-
13
-
14
-
15
-
16
List of the time used by each algorithm.
منشور في 2024"…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …"
-
17
Sanitized databases using MLHProtector algorithm.
منشور في 2025"…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …"
-
18
-
19
-
20