يعرض 101 - 120 نتائج من 514 نتيجة بحث عن '(( code ((generation algorithm) OR (genetics algorithm)) ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.34s تنقيح النتائج
  1. 101

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…The analytical first- and second-order derivatives with respect to Cartesian coordinates are built automatically to provide for the seamless integration of such GICs into geometry optimization, potential energy surface searching and scans, and normal-mode analysis in terms of internal coordinates, all without further coding. Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  2. 102

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…The analytical first- and second-order derivatives with respect to Cartesian coordinates are built automatically to provide for the seamless integration of such GICs into geometry optimization, potential energy surface searching and scans, and normal-mode analysis in terms of internal coordinates, all without further coding. Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  3. 103
  4. 104
  5. 105

    Flowchart for GR codes. حسب R. Sakthivel (2589547)

    منشور في 2024
    "…The algorithm was developed and coded in Verilog and simulated using Modelsim. …"
  6. 106
  7. 107
  8. 108
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115

    Image 1_Plagiarism types and detection methods: a systematic survey of algorithms in text analysis.jpeg حسب Altynbek Amirzhanov (20887919)

    منشور في 2025
    "…We highlight notable works focusing on cross-language plagiarism detection, source code plagiarism, and intrinsic detection techniques, identifying their contributions and limitations. …"
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120