Search alternatives:
method algorithm » mould algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
element » elements (Expand Search)
-
241
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
242
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
243
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
244
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …”
-
245
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
246
A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns
Published 2023“…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. The MLs' performance is evaluated using metrics including accuracy, sensitivity, specificity, and F1-score for the M1, and coefficient of variation of root mean squared error, mean absolute percentage error (MAPE), and median absolute percentage error for the M2. …”
-
247
Copy number variations in the genome of the Qatari population
Published 2015“…Genotyping intensities and genome sequencing data from 97 Qataris were analyzed with four different algorithms and integrated to discover 16,660 high confidence CNV regions (CNVRs) in the total population, affecting ~28 Mb in the median Qatari genome. …”
-
248
Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates
Published 2020“…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
Get full text
article -
249
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…Yet several barriers were highlighted. Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
Get full text
-
250
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
Published 2021“…Moving forward, important findings along with domain-specific problems, difficulties and challenges that remain unresolved are thoroughly discussed, including the absence of: (i) precise definitions of anomalous power consumption, (ii) annotated datasets, (iii) unified metrics to assess the performance of existing solutions, (iv) platforms for reproducibility and (v) privacy-preservation. …”
-
251
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
252
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article -
253
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
254
-
255
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
Get full text
Get full text
article -
256
The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review
Published 2022“…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”
-
257
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…Currently, it is difficult to classify cancers using microarray data. Nearly many data mining techniques have failed because of the small sample size, which has become more critical for organizations. …”
-
258
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text
-
259
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
Get full text
Get full text
Get full text
masterThesis -
260
Scatter search technique for exam timetabling
Published 2011“…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
Get full text
Get full text
Get full text
article