Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
-
721
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
Get full text
-
722
Correlation Clustering via 2-Club Clustering with Vertex Splitting
Published 2024Get full text
Get full text
Get full text
masterThesis -
723
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
Get full text
article -
724
Data redundancy management for leaf-edges in connected environments
Published 2022“…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
Get full text
Get full text
Get full text
Get full text
article -
725
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
726
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
Published 2021“…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …”
-
727
An XML Document Comparison Framework
Published 2001“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
article -
728
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
article -
729
Approximate XML structure validation technical report
Published 2014“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
article -
730
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
Published 2025“…Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
-
731
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
732