بدائل البحث:
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
algorithm growth » algorithm both (توسيع البحث), algorithm flow (توسيع البحث), algorithm from (توسيع البحث)
python function » protein function (توسيع البحث)
growth function » growth direction (توسيع البحث)
algorithm fc » algorithm etc (توسيع البحث), algorithm pca (توسيع البحث), algorithms mc (توسيع البحث)
fc function » spc function (توسيع البحث), _ function (توسيع البحث), a function (توسيع البحث)
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
algorithm growth » algorithm both (توسيع البحث), algorithm flow (توسيع البحث), algorithm from (توسيع البحث)
python function » protein function (توسيع البحث)
growth function » growth direction (توسيع البحث)
algorithm fc » algorithm etc (توسيع البحث), algorithm pca (توسيع البحث), algorithms mc (توسيع البحث)
fc function » spc function (توسيع البحث), _ function (توسيع البحث), a function (توسيع البحث)
-
161
Performance comparison of different ML models.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
162
Classification Report for the proposed model.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
163
ROC curve of the proposed model.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
164
Fog-IoT architecture.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
165
Computational cost of the proposed approach.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
166
Confusion Matrix of different ML models.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
167
Performance metrics of applied ML models.
منشور في 2025"…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…"
-
168
-
169
-
170
<b>FCG-MFD: Benchmark Function Call Graph-Based Dataset for Malware Family Detection</b>
منشور في 2024"…<p dir="ltr">Cyber crimes related to malware families are on the rise. This growth persists despite the prevalence of various antivirus software and approaches for malware detection and classification. …"
-
171
Data Sheet 1_Optimal allocation of renewable energy sources and power filters in unbalanced distribution systems with nonlinear loads under load growth condition.docx
منشور في 2025"…This study uses probability distribution functions to simulate the fluctuating nature of RES and load. …"
-
172
Table 1_Trajectories of health conditions predict cardiovascular disease risk among middle-aged and older adults: a national cohort study.docx
منشور في 2025"…Trajectories of multimorbidity status, activities of daily living (ADLs) limitations, body roundness index (BRI), pain, sleep duration, depressive symptoms, and cognitive function were identified using latent class growth models (LCGMs). …"
-
173
-
174
-
175
-
176
Table 2_Uncovering differential gene expression between mtRNA-positive and -negative osteosarcoma cells: implications beyond mitochondrial function.xlsx
منشور في 2025"…Identifying novel molecular targets to inhibit osteosarcoma cell growth remains an urgent challenge.</p>Methods<p>Explore the function of mtRNA in the occurrence and development of osteosarcoma utilizing bioinformatics analysis of the Gene Expression Omnibus (GEO) microarray dataset. …"
-
177
Table 1_Uncovering differential gene expression between mtRNA-positive and -negative osteosarcoma cells: implications beyond mitochondrial function.xlsx
منشور في 2025"…Identifying novel molecular targets to inhibit osteosarcoma cell growth remains an urgent challenge.</p>Methods<p>Explore the function of mtRNA in the occurrence and development of osteosarcoma utilizing bioinformatics analysis of the Gene Expression Omnibus (GEO) microarray dataset. …"
-
178
Table 3_Uncovering differential gene expression between mtRNA-positive and -negative osteosarcoma cells: implications beyond mitochondrial function.xlsx
منشور في 2025"…Identifying novel molecular targets to inhibit osteosarcoma cell growth remains an urgent challenge.</p>Methods<p>Explore the function of mtRNA in the occurrence and development of osteosarcoma utilizing bioinformatics analysis of the Gene Expression Omnibus (GEO) microarray dataset. …"
-
179
-
180
Data Sheet 1_Systematic pan-cancer analysis identifies PKNOX1 as a potential prognostic and immunological biomarker and its functional validation.docx
منشور في 2025"…The correlations between PKNOX1 expression and MDSC immune infiltration and immune cells were analyzed using the TIDE algorithm and the ESTIMATE algorithm. PKNOX1 -interacting proteins and expression-related genes were analysed via the STRING and TIMER 2.0 platforms, and the functions of PKNOX1 in tumors and the cell pathways involved were predicted via KEGG enrichment analysis. …"