يعرض 1 - 20 نتائج من 9,835 نتيجة بحث عن '(( element mesh algorithm ) OR ((( surface processing algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.49s تنقيح النتائج
  1. 1

    iFAD∞ and other flow direction algorithms with test data حسب cheng (21018992)

    منشور في 2025
    الموضوعات: "…Geomorphology and earth surface processes…"
  2. 2
  3. 3

    Point cloud data. حسب Chenhua Jiang (20765737)

    منشور في 2025
    الموضوعات:
  4. 4
  5. 5
  6. 6

    Measurement method of point cloud data. حسب Chenhua Jiang (20765737)

    منشور في 2025
    الموضوعات:
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Simulated solution and the original spectral data of the actual water sample. حسب Wang hongmei (22598690)

    منشور في 2025
    الموضوعات: "…Surface water quality processes and contaminated sediment assessment…"
  12. 12
  13. 13

    Supplementary materials for PhD thesis "Satellite thermal remote sensing of active volcanoes : understanding volcanic processes and application to automated monitoring algorithms" حسب Saskia Marjoleine van Manen (21687540)

    منشور في 2025
    "…</p><p dir="ltr">Quantitative retrospective analysis of coarse resolution thermal time series and multiparametric studies are used to improve the understanding of volcanic activity and to advance existing monitoring algorithms. …"
  14. 14

    Machining process diagram. حسب Chenhua Jiang (20765737)

    منشور في 2025
    الموضوعات:
  15. 15

    Measurement process diagram of CMM. حسب Chenhua Jiang (20765737)

    منشور في 2025
    الموضوعات:
  16. 16
  17. 17
  18. 18
  19. 19

    List of the time used by each algorithm. حسب JiaMing Gong (20427837)

    منشور في 2024
    "…To this end, this paper proposes an entropy-based dynamic ensemble classification algorithm (EDAC) to consider data streams with class imbalance and concept drift simultaneously. …"
  20. 20

    Sanitized databases using MLHProtector algorithm. حسب Loan T. T. Nguyen (20660789)

    منشور في 2025
    "…<div><p>Privacy is as a critical issue in the age of data. Organizations and corporations who publicly share their data always have a major concern that their sensitive information may be leaked or extracted by rivals or attackers using data miners. …"