يعرض 1 - 20 نتائج من 179 نتيجة بحث عن '(( ((algorithm link) OR (algorithm using)) function ) OR ( algorithm within function ))~', وقت الاستعلام: 0.53s تنقيح النتائج
  1. 1
  2. 2

    Multi-scale detection of hierarchical community architecture in structural and functional brain networks حسب Arian Ashourvan (6685232)

    منشور في 2019
    "…To address this limitation, we exercise a multi-scale extension of a common community detection technique, and we apply the tool to synthetic graphs and to graphs derived from human neuroimaging data, including structural and functional imaging data. Our multi-scale community detection algorithm links a graph to copies of itself across neighboring topological scales, thereby becoming sensitive to conserved community organization across levels of the hierarchy. …"
  3. 3
  4. 4
  5. 5

    <b>Opti2Phase</b>: Python scripts for two-stage focal reducer حسب Morgan Najera (21540776)

    منشور في 2025
    "…</p><p dir="ltr">The package includes:</p><ul><li>Scripts for first-order analysis, third-order modeling, optimization using a Physically Grounded Merit Function (PGMF), and RMS-based refinement.…"
  6. 6

    Data_Sheet_1_Claims-based algorithm to estimate the Expanded Disability Status Scale for multiple sclerosis in a German health insurance fund: a validation study using patient medi... حسب Erwan Muros-Le Rouzic (12518902)

    منشور في 2023
    "…Data were deterministically linked based on insurance numbers. We used 69 MS-related diagnostic indicators recorded with ICD-10-GM codes within 3 months before and after recorded true EDSS measures to estimate a claims-based EDSS proxy (pEDSS). …"
  7. 7

    Packet loss rate in different methods. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  8. 8

    Throughput in different methods. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  9. 9

    Advantages and disadvantages of related works. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  10. 10

    Packet delivery rate in different methods. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  11. 11

    S2 Text - حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  12. 12

    Energy consumption in different methods. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  13. 13

    Intra-cluster security process. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  14. 14

    Route request format [35]. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  15. 15

    Simulation parameters. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  16. 16

    S1 Text - حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  17. 17

    Inter-cluster security process. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  18. 18

    Delay in different methods. حسب Mehdi Hosseinzadeh (8383239)

    منشور في 2023
    "…In the second algorithm, we employs a symmetric encryption strategy to build secure connection links within a cluster. …"
  19. 19
  20. 20