Search alternatives:
processing algorithm » processing algorithms (Expand Search)
lacking algorithm » learning algorithms (Expand Search)
would algorithm » mould algorithm (Expand Search)
Showing 21 - 40 results of 96 for search '(((( data lacking algorithm ) OR ( text processing algorithm ))) OR ( elements would algorithm ))', query time: 0.15s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24

    Topics in graph algorithms by Abu-Khzam, Faisal Nabih

    Published 2003
    “…This is a notable improvement over the previous best known algorithm, which runs in O(8kn). In addition to the structural and algorithmic results, this text tries to illustrate the practicality of fixed-parameter algorithms. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 25
  6. 26
  7. 27

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  8. 28

    Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation by Attieh, Joseph

    Published 2024
    “…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33
  14. 34
  15. 35

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
    Get full text
    Get full text
  16. 36

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…<h3>Background</h3><p dir="ltr">Research gaps refer to unanswered questions in the existing body of knowledge, either due to a lack of studies or inconclusive results. Research gaps are essential starting points and motivation in scientific research. …”
  17. 37

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 38

    An ant colony optimization algorithm to improve software quality prediction models by Azar, D.

    Published 2011
    “…However, building accurate prediction models is hard due to the lack of data in the domain of software engineering. …”
    Get full text
    Get full text
    Get full text
    article
  19. 39
  20. 40

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text