بدائل البحث:
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
elements each » elements crcy (توسيع البحث), elements uce (توسيع البحث), experiments each (توسيع البحث)
processing algorithm » modeling algorithm (توسيع البحث), routing algorithm (توسيع البحث), tracking algorithm (توسيع البحث)
data processing » image processing (توسيع البحث)
using algorithm » using algorithms (توسيع البحث), routing algorithm (توسيع البحث), fusion algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), means algorithm (توسيع البحث)
elements each » elements crcy (توسيع البحث), elements uce (توسيع البحث), experiments each (توسيع البحث)
-
1
The run time for each algorithm in seconds.
منشور في 2025"…Finally, we use the Laplace approximation to determine a lower bound for the out-of-sample prediction error and derive a scalable expression for the marginal variance of each prediction. …"
-
2
-
3
-
4
-
5
-
6
-
7
Kidney Transplant Biopsy-derived signature matrix of 18 cell phenotypes (KTB18) for deconvolution using the CIBERSORTx algorithm
منشور في 2025"…<p dir="ltr"><a href="https://www.nature.com/articles/s41587-019-0114-2" rel="noreferrer" target="_blank">CIBERSORTx</a> is an algorithm, accessible through a <a href="https://cibersortx.stanford.edu/index.php" rel="noreferrer" target="_blank">web portal</a>, designed to infer the cellular composition of bulk RNA-seq or microarray data, referred to as "mixture files". …"
-
8
-
9
-
10
-
11
-
12
-
13
Credit Card Fraud Classification Using Applied Machine Learning – A Comparative Study of 24 ML Algorithms
منشور في 2025"…<p dir="ltr">Credit Card Fraud Classification Using Applied Machine Learning – A Comparative Study of 24 ML Algorithms</p><p dir="ltr">This study describes an empirical evaluation of 24 machine learning models, including Logistic Regression, Decision Trees, Random Forests, Support Vector Machines and Neural Networks using a highly imbalanced fraud dataset that reflects the real-world where the data was culled from. …"
-
14
-
15
-
16
-
17
-
18
Partial derivatives of the log-LF.
منشور في 2024"…Finally, we demonstrate effectiveness of our estimation method in practical applications using a set of real data.</p></div>…"
-
19
-
20