Search alternatives:
interactions algorithm » interactor algorithm (Expand Search), detection algorithm (Expand Search), generation algorithm (Expand Search)
resource interactions » researcher interactions (Expand Search), feature interactions (Expand Search), resource extraction (Expand Search)
multiple resource » multiple sources (Expand Search), multiple research (Expand Search)
interactions algorithm » interactor algorithm (Expand Search), detection algorithm (Expand Search), generation algorithm (Expand Search)
resource interactions » researcher interactions (Expand Search), feature interactions (Expand Search), resource extraction (Expand Search)
multiple resource » multiple sources (Expand Search), multiple research (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
IUTF Dataset(Enhanced): Enabling Cross-Border Resource for Analysing the Impact of Rainfall on Urban Transportation Systems
Published 2025“…IUTF Dataset: A Cross-Border Resource for Analysing the Impact of Rainfall on Urban Transportation Systems<h2>Description</h2><p dir="ltr">The Integrated Urban Traffic-Flood (IUTF) dataset is a comprehensive, open-access resource that addresses a critical gap in urban transportation and climate resilience research. …”
-
12
-
13
Cross-tabulation of study participants by gender.
Published 2025“…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
-
14
ROC curve performance of SWB prediction.
Published 2025“…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
-
15
Predictors of SWB.
Published 2025“…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
-
16
Supplementary Fig 1.
Published 2025“…Our study selected a wide range of predictors, including sociodemographic characteristics, leisure activities, social class identification, and preferences in socialization interaction patterns. Eight common ML algorithms were utilized to construct prediction models. …”
-
17
Overview of LWLCM.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
18
Key initialization.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
19
Decryption Time(sec).
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”
-
20
Key-Keystream Avalanche effect.
Published 2025“…<div><p>The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. …”