بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
21
A hybrid approach for XML similarity
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
22
Automated skills assessment in open surgery: A scoping review
منشور في 2025"…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …"
-
23
On the complexity of multi-parameterized cluster editing
منشور في 2017"…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
24
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
منشور في 2013احصل على النص الكامل
doctoralThesis -
25
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …"
احصل على النص الكامل
-
26
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
احصل على النص الكامل
-
27
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
28
-
29
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
30
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …"
-
31
Modelling Exchange Rates during Currency Crisis using Neural Networks
منشور في 2006"…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
32
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
33
Structural similarity evaluation between XML documents and DTDs
منشور في 2007"…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
34
A survey and comparison of wormhole routing techniques in a meshnetworks
منشور في 1997"…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …"
احصل على النص الكامل
احصل على النص الكامل
article -
35
-
36
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
منشور في 2007"…Making use of the neighborhood concept in knowledge bases to identify semantic implications constitutes the core of our proposal. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
37
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
منشور في 2023"…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …"
-
38
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
منشور في 2023"…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article