Showing 1,381 - 1,400 results of 4,770 for search '(( algorithm fibrin function ) OR ((( algorithm python function ) OR ( algorithm a function ))))', query time: 0.26s Refine Results
  1. 1381

    Hybrid redundancy for SKINNY block cipher. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  2. 1382

    Tweakey updating schedule. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  3. 1383

    Hybrid redundancy. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  4. 1384

    Fault detection capability of RECO and DMRC. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  5. 1385

    One SKINNY encryption round. by Sonal Arvind Barge (20454967)

    Published 2024
    “…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
  6. 1386

    G4SNVHunter workflow for identifying variants that affect G4 formation. by Rongxin Zhang (1618159)

    Published 2025
    “…Subsequently, the impact of the variants on the formation potential of the identified G4s will be assessed based on the G4Hunter algorithm (Middle panel). Finally, candidate variants can be filtered and visualized using functions provided by G4SNVHunter to screen out those that can potentially disrupt the formation of G4 structures (Right panel). …”
  7. 1387
  8. 1388

    AE positioning projection. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  9. 1389

    K-SVD dictionary learning process. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  10. 1390

    Evaluation of denoising effect. by Li Jiaqing (21212614)

    Published 2025
    “…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
  11. 1391

    Fusion effectiveness of 6 groups of images. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  12. 1392

    Overall flowchart of Multi-agent fusion model. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  13. 1393

    Fusion performance of 3 groups fusion structures. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  14. 1394

    Fusion rule set. by Yandong Liu (11893664)

    Published 2025
    “…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
  15. 1395
  16. 1396

    Table 1_Diagnostic performance of artificial intelligence in detecting oral potentially malignant disorders and oral cancer using medical diagnostic imaging: a systematic review an... by Rakesh Kumar Sahoo (12420508)

    Published 2024
    “…</p>Conclusion<p>These findings suggest that AI algorithms have the potential to function as reliable tools for the early diagnosis of OPMDs and oral cancer, offering significant advantages, particularly in resource-constrained settings.…”
  17. 1397

    Service coverage at different p-values. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  18. 1398

    Location of fire station facility sites. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  19. 1399

    Chromosome coding. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  20. 1400

    Definition of parameters. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”