بدائل البحث:
making algorithm » learning algorithm (توسيع البحث), finding algorithm (توسيع البحث), means algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
element making » element mapping (توسيع البحث), elemental mapping (توسيع البحث), element modeling (توسيع البحث)
ipca algorithm » wgcna algorithm (توسيع البحث), cscap algorithm (توسيع البحث), ii algorithm (توسيع البحث)
elements ipca » elements crcy (توسيع البحث), elements ppm (توسيع البحث), elements ices (توسيع البحث)
making algorithm » learning algorithm (توسيع البحث), finding algorithm (توسيع البحث), means algorithm (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
element making » element mapping (توسيع البحث), elemental mapping (توسيع البحث), element modeling (توسيع البحث)
ipca algorithm » wgcna algorithm (توسيع البحث), cscap algorithm (توسيع البحث), ii algorithm (توسيع البحث)
elements ipca » elements crcy (توسيع البحث), elements ppm (توسيع البحث), elements ices (توسيع البحث)
-
1
-
2
Risk element category diagram.
منشور في 2025"…This article extracted features related to risk assessment, such as weather factors, airport facility inspections, and security check results, and conducted qualitative and quantitative analysis on these features to generate a datable risk warning weight table. This article used these data to establish an LSTM model, which trained LSTM to identify potential risks and provide early warning by learning patterns and trends in historical data. …"
-
3
List of the time used by each algorithm.
منشور في 2024"…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …"
-
4
Sanitized databases using MLHProtector algorithm.
منشور في 2025"…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …"
-
5
-
6
-
7
-
8
-
9
The mAP for all algorithms and 80% of the data used for training.
منشور في 2024"…<p>The mAP for all algorithms and 80% of the data used for training.</p>…"
-
10
The mAP for all algorithms and 50% of the data used for training.
منشور في 2024"…<p>The mAP for all algorithms and 50% of the data used for training.</p>…"
-
11
The mAP for all algorithms and 60% of the data used for training.
منشور في 2024"…<p>The mAP for all algorithms and 60% of the data used for training.</p>…"
-
12
Point cloud data registration using the original ICP algorithm.
منشور في 2025"…<p>Point cloud data registration using the original ICP algorithm.…"
-
13
-
14
-
15
-
16
-
17
-
18
-
19
-
20