Showing 141 - 160 results of 292 for search '(( algorithm spc function ) OR ((( algorithm python function ) OR ( algorithm growth function ))))', query time: 0.45s Refine Results
  1. 141

    Table 1_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx by Anjan Kumar Pradhan (9386369)

    Published 2025
    “…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
  2. 142

    Table 4_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx by Anjan Kumar Pradhan (9386369)

    Published 2025
    “…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
  3. 143

    Table 5_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx by Anjan Kumar Pradhan (9386369)

    Published 2025
    “…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
  4. 144
  5. 145

    AP-2α 相关研究 by Ya-Hong Wang (21080642)

    Published 2025
    “…(B) and (D) Radial growth measurements of strains depicted in (A) and (C). …”
  6. 146

    Table 1_Fetal cardiac rhabdomyomas susceptible to prenatal treatment with mTOR inhibitors: literature review and proposal of a prenatal management algorithm.docx by Alfonso Martinez-Garcia (22802108)

    Published 2025
    “…Based on these findings, we proposed echocardiographic criteria to identify suitable candidates, including inflow/outflow tract obstruction, severe atrioventricular valve insufficiency, tachyarrhythmia, impaired cardiac function, or hydrops, and developed a structured prenatal management algorithm. …”
  7. 147

    Table 2_Fetal cardiac rhabdomyomas susceptible to prenatal treatment with mTOR inhibitors: literature review and proposal of a prenatal management algorithm.docx by Alfonso Martinez-Garcia (22802108)

    Published 2025
    “…Based on these findings, we proposed echocardiographic criteria to identify suitable candidates, including inflow/outflow tract obstruction, severe atrioventricular valve insufficiency, tachyarrhythmia, impaired cardiac function, or hydrops, and developed a structured prenatal management algorithm. …”
  8. 148
  9. 149

    Comparison with existing work. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  10. 150

    Registration phase. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  11. 151

    Performance comparison of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  12. 152

    Classification Report for the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  13. 153

    ROC curve of the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  14. 154

    Fog-IoT architecture. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  15. 155

    Computational cost of the proposed approach. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  16. 156

    Confusion Matrix of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  17. 157

    Performance metrics of applied ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
  18. 158
  19. 159

    <b>FCG-MFD: Benchmark Function Call Graph-Based Dataset for Malware Family Detection</b> by Hassan jalil hadi (18243805)

    Published 2024
    “…<p dir="ltr">Cyber crimes related to malware families are on the rise. This growth persists despite the prevalence of various antivirus software and approaches for malware detection and classification. …”
  20. 160

    Data Sheet 1_Optimal allocation of renewable energy sources and power filters in unbalanced distribution systems with nonlinear loads under load growth condition.docx by Lavanya Arubolu (22500008)

    Published 2025
    “…This study uses probability distribution functions to simulate the fluctuating nature of RES and load. …”