بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
based processing » waste processing (توسيع البحث), batch processing (توسيع البحث), wood processing (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
based processing » waste processing (توسيع البحث), batch processing (توسيع البحث), wood processing (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
element » elements (توسيع البحث)
-
1
Data Sheet 1_Semantic composition of robotic solver algorithms on graph structures.pdf
منشور في 2025الموضوعات: "…Artificial Intelligence and Image Processing…"
-
2
-
3
Convergence curve of the DBO algorithm.
منشور في 2025"…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …"
-
4
-
5
-
6
-
7
The CGO risk prediction process based on data augmentation and neuroevolution.
منشور في 2025الموضوعات: -
8
-
9
-
10
Prediction of pharmaceuticals occurrence based on sales data and Machine learning algorithms.
منشور في 2025"…<p dir="ltr"><b>anvisa2014_2020</b>: This is a pre processed data from the sales data of industrial pharmaceuticals from SNGPC, Brazil's data.…"
-
11
-
12
-
13
Access control pseudo-code.
منشور في 2025"…Using the key configuration of fuzzy encryption algorithm, high-dimensional medical data attributes with different security levels within the same field undergo encryption and decryption processes. …"
-
14
iFAD∞ and other flow direction algorithms with test data
منشور في 2025"…<p dir="ltr">The Java codes for all the drainage direction algorithms used in the study entitled “A New Multiple Flow Direction Algorithm for Determining Limited Dispersive Domain Based on Flow Aggregation Technique” are provided as an Eclipse Java project. …"
-
15
G R code algorithm.
منشور في 2024"…The algorithm was developed and coded in Verilog and simulated using Modelsim. …"
-
16
-
17
-
18
-
19
-
20
GA pseudo-code.
منشور في 2025"…To solve the network intrusion problem faced by industrial control systems in the current global communication security environment, a network intrusion detection method based on genetic algorithm and improved convolutional neural network is proposed. …"