Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
-
561
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
562
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
563
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
-
564
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
565
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
566
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
567
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
568
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
569
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…Two reviewers independently conducted study selection, data extraction, and risk of bias assessment. Results were synthesized narratively. …”
-
570
Cooperative Caching Policy in Fog Computing for Connected Vehicles
Published 2023Get full text
Get full text
Get full text
masterThesis -
571
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
Published 2022“…Three reviewers independently extracted data from the included studies. A narrative approach was used for data synthesis.…”
-
572
Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression
Published 2023“…Further studies are needed to examine the performance of wearable AI based on a combination of wearable device data and neuroimaging data and to distinguish patients with depression from those with other diseases.…”
-
573
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…The proposed strategies are evaluated using simulations and experimental test bed measurements under realistic operational conditions. …”
Get full text
Get full text
Get full text
masterThesis -
574
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
Get full text
-
575
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
576
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
577
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …”
Get full text
Get full text
article -
578
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
579
On the complexity of multi-parameterized cluster editing
Published 2017Get full text
Get full text
Get full text
Get full text
article -
580
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject