بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
time processing » image processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
time processing » image processing (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
781
-
782
Comparisons of computation rate performance for different offloading algorithms.for N = 10, 20, 30.
منشور في 2025الموضوعات: -
783
-
784
-
785
The running time.
منشور في 2025"…Our key contributions are as follows: (1) applying the Pedersen vector commitment algorithm to construct a biometric-based ZKP scheme, thereby ensuring enhanced security and privacy-preserving authentication; (2) utilizing multimodal cancelable biometrics generate (MCBG) technology, integrating fingerprint, face, and iris modalities to strengthen the security of the verification process; and (3) providing a detailed security analysis that demonstrates our scheme meets essential security requirements, including anonymity, authenticity, unlinkability, forward security, and resistance to replay attacks. …"
-
786
-
787
Table 1_Intra- and inter-rater reliability in log volume estimation based on LiDAR data and shape reconstruction algorithms: a case study on poplar logs.docx
منشور في 2025"…The results of this study indicate that, for improved reliability and efficiency, it is essential to automate point cloud segmentation using advanced machine learning and computer vision algorithms. This approach would eliminate the subjectivity in segmentation decisions and significantly reduce the time required for the process.…"
-
788
-
789
-
790
-
791
-
792
-
793
-
794
ITAE objective function values for all runs of en-CSA, CSA, RUN, PDO and RIME algorithms.
منشور في 2024الموضوعات: -
795
Boxplot analysis for ITAE objective function using en-CSA, CSA, RUN, PDO and RIME algorithms.
منشور في 2024الموضوعات: -
796
-
797
Code snippet from “Netty/Buffer” Maven artefact.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
798
-
799
Real-time implementation of the proposed model.
منشور في 2025"…</p><p>Methodology</p><p>YOLOv8 is employed for its real-time processing capabilities and high precision, making it suitable for identifying and tracking construction elements in images and videos captured on-site. …"
-
800