بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
fluent processing » light processing (توسيع البحث), query processing (توسيع البحث), text processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
fluent processing » light processing (توسيع البحث), query processing (توسيع البحث), text processing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), modeling algorithm (توسيع البحث), finding algorithm (توسيع البحث)
data algorithm » data algorithms (توسيع البحث), update algorithm (توسيع البحث), atlas algorithm (توسيع البحث)
element data » settlement data (توسيع البحث), relevant data (توسيع البحث), movement data (توسيع البحث)
level coding » level according (توسيع البحث), level modeling (توسيع البحث), level using (توسيع البحث)
-
381
-
382
Data Sheet 1_ARGContextProfiler: extracting and scoring the genomic contexts of antibiotic resistance genes using assembly graphs.pdf
منشور في 2025"…Several tools, databases, and algorithms are now available to facilitate the identification of ARGs in metagenomic sequencing data; however, direct annotation of short-read data provides limited contextual information. …"
-
383
-
384
-
385
-
386
Practical implementation of an End-to-end methodology for SPC of 3-D part geometry: A case study
منشور في 2025"…<p>Del Castillo and Zhao have recently proposed a new methodology for the Statistical Process Control (SPC) of discrete parts whose 3-dimensional (3D) geometrical data are acquired with non-contact sensors. The approach is based on monitoring the spectrum of the Laplace–Beltrami (LB) operator of each scanned part estimated using finite element methods (FEM). …"
-
387
Possible graph filter functions.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
388
The notational conventions used in this paper.
منشور في 2025"…The goal of this paper is to examine several extensions to KGR/GPoG, with the aim of generalising them a wider variety of data scenarios. The first extension we consider is the case of graph signals that have only been partially recorded, meaning a subset of their elements is missing at observation time. …"
-
389
Data Sheet 1_Beyond the current state of just-in-time adaptive interventions in mental health: a qualitative systematic review.pdf
منشور في 2025"…To accomplish this, JITAIs often apply complex analytic techniques, such as machine learning or Bayesian algorithms to real- or near-time data acquired from smartphones and other sensors. …"
-
390
-
391
DataSheet1_Enhancing slope stability prediction through integrated PCA-SSA-SVM modeling: a case study of LongLian expressway.docx
منشور في 2024"…Traditional slope stability analysis methods, such as the limit equilibrium method, limit analysis method, and finite element method, often face limitations due to computational complexity and the need for extensive soil property data. …"
-
392
-
393
Overall framework design.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
394
Gamma distribution of reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
395
Top 5 correlated features based on reuse.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
396
Features with the top importance score.
منشور في 2025"…Our approach uses cross-project code clone detection to establish the ground truth for software reuse, identifying code clones across popular GitHub projects as indicators of potential reuse candidates. …"
-
397
Data Sheet 1_Image-assisted textural analysis of plagioclase crystals in volcanic rocks: an application to lavas erupted on 2021 at Pacaya volcano, Guatemala.docx
منشور في 2025"…In this study, we have processed X-ray maps of major elements from the 2021 basaltic lava rocks of Pacaya volcano (Guatemala) through the Quantitative X-ray Map Analyzer (Q-XRMA) software. …"
-
398
-
399
Intuitionistic fuzzy number .
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"
-
400
Experimental message into the integer.
منشور في 2024"…Consequently, inaccurate cryptographic data is more effectively represented, manipulated, and protected. …"