Search alternatives:
algorithm python » algorithms within (Expand Search), algorithm both (Expand Search)
within function » fibrin function (Expand Search), protein function (Expand Search), catenin function (Expand Search)
python function » protein function (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm b (Expand Search)
a function » _ function (Expand Search)
algorithm python » algorithms within (Expand Search), algorithm both (Expand Search)
within function » fibrin function (Expand Search), protein function (Expand Search), catenin function (Expand Search)
python function » protein function (Expand Search)
algorithm a » algorithms a (Expand Search), algorithm _ (Expand Search), algorithm b (Expand Search)
a function » _ function (Expand Search)
-
1581
Tweakey updating schedule.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1582
Hybrid redundancy.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1583
Fault detection capability of RECO and DMRC.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1584
One SKINNY encryption round.
Published 2024“…IoT devices are secured by cryptographic algorithms, but their dependability is a major concern. …”
-
1585
AE positioning projection.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1586
K-SVD dictionary learning process.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1587
Evaluation of denoising effect.
Published 2025“…The K-SVD algorithm functions as an adaptive filter, learning from AE signals in various damage states to remove background noise and retain critical structural characteristics. …”
-
1588
Fusion effectiveness of 6 groups of images.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1589
Overall flowchart of Multi-agent fusion model.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1590
Fusion performance of 3 groups fusion structures.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1591
Fusion rule set.
Published 2025“…First, we analyze the functional architecture of agents and the inherent properties of multi-agent systems to construct a multi-agent fusion model and corresponding fusion agents. …”
-
1592
-
1593
Table 1_Diagnostic performance of artificial intelligence in detecting oral potentially malignant disorders and oral cancer using medical diagnostic imaging: a systematic review an...
Published 2024“…</p>Conclusion<p>These findings suggest that AI algorithms have the potential to function as reliable tools for the early diagnosis of OPMDs and oral cancer, offering significant advantages, particularly in resource-constrained settings.…”
-
1594
Service coverage at different p-values.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1595
Location of fire station facility sites.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1596
Chromosome coding.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1597
Definition of parameters.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1598
Distribution of demand points by level.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1599
S1 Data -
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
-
1600
Solution results when p = 8~20.
Published 2024“…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”