بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
based method » based methods (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
based method » based methods (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
-
41
-
42
Model-Based Clustering of Categorical Data Based on the Hamming Distance
منشور في 2024"…<p>A model-based approach is developed for clustering categorical data with no natural ordering. …"
-
43
-
44
Dual deconvolution algorithm: analysis code with experimental data
منشور في 2025"…<p dir="ltr">This software package provides key algorithms for dual-deconvolution microscopy analysis, along with both experimental and numerical data. …"
-
45
-
46
-
47
-
48
-
49
-
50
data and code
منشور في 2025"…Combined with the road network data, this algorithm regards the trajectory data as a signal that changes dynamically with time, converts it from time domain to frequency domain through Fourier transform, fits the trajectory points in the spectrum domain, and converts the discrete trajectory points into time continuous line elements.…"
-
51
GA pseudo-code.
منشور في 2025"…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …"
-
52
-
53
Process of facial feature extraction and recognition method based on ipca algorithm.
منشور في 2025"…<p>Process of facial feature extraction and recognition method based on ipca algorithm.</p>…"
-
54
Experimental steps of modulation pattern recognition method based on IABLN algorithm.
منشور في 2025"…<p>Experimental steps of modulation pattern recognition method based on IABLN algorithm.</p>…"
-
55
-
56
The pseudo-code of the WOA-LSTM-PID model.
منشور في 2025"…To solve this problem, the study proposes an improved PID controller based on the Long Short-Term Memory (LSTM) optimized by the Whale Optimization Algorithm (WOA). …"
-
57
-
58
-
59
-
60