بدائل البحث:
complement component » complex components (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
complement component » complex components (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
-
281
-
282
-
283
-
284
-
285
DMTD algorithm.
منشور في 2025"…Finally, we conducted comparative tests of the manual driving, intelligent driving algorithm (ITOR, STON), and the algorithms proposed in this paper, EITO, using real line data from the Yizhuang Line of Beijing Metro (YLBS). …"
-
286
-
287
-
288
-
289
-
290
-
291
-
292
-
293
Phases of proposed algorithm.
منشور في 2025"…To address these limitations, this paper proposes a novel diagnostic framework based on Hypersoft Fuzzy Rough Set (HSFRS) theory.This hybrid approach integrates the flexibility of hypersoft sets for modeling multi-parameter relationships, the strength of fuzzy logic in handling vagueness, and the approximation capabilities of rough set theory to manage data uncertainty. Using a pseudo fuzzy binary relation, we define lower and upper approximation operators for fuzzy subsets within the parameter space. …"
-
294
-
295
Algorithm process.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
296
Algorithm comparison.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
297
Algorithm comparison.
منشور في 2025"…This paper aims to address these challenges by proposing an automated DDoS attack detection algorithm using the Informer model. We introduce a windowing technique to segment network traffic into manageable samples, which are then input into the Informer for feature extraction and classification. …"
-
298
-
299
Data used for the analyses in this study.
منشور في 2025"…This study applies and evaluates machine learning (ML) algorithms to predict LBW and identify its key risk factors in Bangladesh. …"
-
300