Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm growth » algorithm both (Expand Search), algorithm flow (Expand Search), algorithm from (Expand Search)
python function » protein function (Expand Search)
growth function » growth direction (Expand Search)
algorithm spc » algorithm etc (Expand Search), algorithm pca (Expand Search), algorithm seu (Expand Search)
spc function » _ function (Expand Search), a function (Expand Search), i function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm growth » algorithm both (Expand Search), algorithm flow (Expand Search), algorithm from (Expand Search)
python function » protein function (Expand Search)
growth function » growth direction (Expand Search)
algorithm spc » algorithm etc (Expand Search), algorithm pca (Expand Search), algorithm seu (Expand Search)
spc function » _ function (Expand Search), a function (Expand Search), i function (Expand Search)
-
141
Table 1_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx
Published 2025“…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
-
142
Table 4_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx
Published 2025“…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
-
143
Table 5_Predictive prioritization of genes significantly associated with biotic and abiotic stresses in maize using machine learning algorithms.xlsx
Published 2025“…<p>Both biotic and abiotic stresses pose serious threats to the growth and productivity of crop plants, including maize worldwide. …”
-
144
-
145
AP-2α 相关研究
Published 2025“…(B) and (D) Radial growth measurements of strains depicted in (A) and (C). …”
-
146
Table 1_Fetal cardiac rhabdomyomas susceptible to prenatal treatment with mTOR inhibitors: literature review and proposal of a prenatal management algorithm.docx
Published 2025“…Based on these findings, we proposed echocardiographic criteria to identify suitable candidates, including inflow/outflow tract obstruction, severe atrioventricular valve insufficiency, tachyarrhythmia, impaired cardiac function, or hydrops, and developed a structured prenatal management algorithm. …”
-
147
Table 2_Fetal cardiac rhabdomyomas susceptible to prenatal treatment with mTOR inhibitors: literature review and proposal of a prenatal management algorithm.docx
Published 2025“…Based on these findings, we proposed echocardiographic criteria to identify suitable candidates, including inflow/outflow tract obstruction, severe atrioventricular valve insufficiency, tachyarrhythmia, impaired cardiac function, or hydrops, and developed a structured prenatal management algorithm. …”
-
148
-
149
Comparison with existing work.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
150
Registration phase.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
151
Performance comparison of different ML models.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
152
Classification Report for the proposed model.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
153
ROC curve of the proposed model.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
154
Fog-IoT architecture.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
155
Computational cost of the proposed approach.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
156
Confusion Matrix of different ML models.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
157
Performance metrics of applied ML models.
Published 2025“…Our proposed scheme utilizes several hash functions through symmetric encryption and decryption techniques to ensure secure end-to-end communication.…”
-
158
-
159
<b>FCG-MFD: Benchmark Function Call Graph-Based Dataset for Malware Family Detection</b>
Published 2024“…<p dir="ltr">Cyber crimes related to malware families are on the rise. This growth persists despite the prevalence of various antivirus software and approaches for malware detection and classification. …”
-
160
Data Sheet 1_Optimal allocation of renewable energy sources and power filters in unbalanced distribution systems with nonlinear loads under load growth condition.docx
Published 2025“…This study uses probability distribution functions to simulate the fluctuating nature of RES and load. …”