Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
relevance » relevant (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
relevance » relevant (Expand Search)
-
21
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Additionally, eight FSAs are evaluated on these datasets based on their relevance and novelty. The paper first introduces the datasets and then provides a comprehensive experimental analysis of the performance of the selected FSAs on these datasets including testing the FSAs’ resilience on two types of induced data noise. …”
Get full text
article -
22
A Novel Centrality-Based Approach for Link Prediction
Published 2025Get full text
Get full text
Get full text
masterThesis -
23
A simple approach for testing web service based applications
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
24
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…Experiments carried out on synthetic and real-life XACML policies explore the relevance of our analysis algorithms with acceptable overhead. …”
Get full text
Get full text
Get full text
article -
25
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
article -
26
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
27
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …”
-
28
-
29
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
30
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…We used a machine learning–based method to analyze the most relevant COVID-19–related articles and extracted the most prominent topics. …”
-
31
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. </p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …”
-
32
Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study
Published 2024“…Our BERTopic-based approach involves 3 stages: embedding documents, clustering documents (dimension reduction and clustering), and representing topics (generating candidates and maximizing candidate relevance).…”
-
33
-
34
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
35
-
36
-
37
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …”
-
38
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
39
A collaborative filtering recommendation framework utilizing social networks
Published 2023“…The current study proposes a collaborative filtering recommendation framework that employs social networks to generate more precise and pertinent recommendations. The framework is based on a modified version of the user-based collaborative filtering algorithm, which computes user similarity based on their ratings and social connections. …”
-
40
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …”