Search alternatives:
algorithm fibrin » algorithm within (Expand Search), algorithms within (Expand Search), algorithm from (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
fibrin function » brain function (Expand Search)
python function » protein function (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm b (Expand Search)
a function » _ function (Expand Search)
algorithm fibrin » algorithm within (Expand Search), algorithms within (Expand Search), algorithm from (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
fibrin function » brain function (Expand Search)
python function » protein function (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm b (Expand Search)
a function » _ function (Expand Search)
-
1381
Hybrid redundancy for SKINNY block cipher.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1382
Tweakey updating schedule.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1383
Hybrid redundancy.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1384
Fault detection capability of RECO and DMRC.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1385
One SKINNY encryption round.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1386
G4SNVHunter workflow for identifying variants that affect G4 formation.
Published 2025“…Subsequently, the impact of the variants on the formation potential of the identified G4s will be assessed based on the G4Hunter algorithm (Middle panel). Finally, candidate variants can be filtered and visualized using functions provided by G4SNVHunter to screen out those that can potentially disrupt the formation of G4 structures (Right panel). …”
-
1387
-
1388
AE positioning projection.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1389
K-SVD dictionary learning process.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1390
Evaluation of denoising effect.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1391
Fusion effectiveness of 6 groups of images.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1392
Overall flowchart of Multi-agent fusion model.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1393
Fusion performance of 3 groups fusion structures.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1394
Fusion rule set.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1395
-
1396
Table 1_Diagnostic performance of artificial intelligence in detecting oral potentially malignant disorders and oral cancer using medical diagnostic imaging: a systematic review an...
Published 2024“…</p>Conclusion<p>These findings suggest that AI algorithms have the potential to function as reliable tools for the early diagnosis of OPMDs and oral cancer, offering significant advantages, particularly in resource-constrained settings.…”
-
1397
Service coverage at different p-values.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1398
Location of fire station facility sites.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1399
Chromosome coding.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1400
Definition of parameters.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”