بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
-
1
Auto-indexing Arabic texts based on association rule data mining. (c2015)
منشور في 2015"…The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
2
A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text
منشور في 2019الموضوعات: "…text mining; ontology learning; hybrid models; genetic algorithms; whale optimization algorithm…"
احصل على النص الكامل
احصل على النص الكامل
-
3
Indexing Arabic texts using association rule data mining
منشور في 2019"…The method uses an association rule mining algorithm for extracting frequent sets containing related items to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
4
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
منشور في 2015"…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …"
احصل على النص الكامل
-
5
-
6
-
7
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
-
8
-
9
-
10
-
11
-
12
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
13
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
14
-
15
-
16
-
17
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
احصل على النص الكامل
article -
18
-
19
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
20
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article