Showing 721 - 732 results of 732 for search '(((( element means algorithm ) OR ( complement custom algorithm ))) OR ( model using algorithm ))', query time: 0.10s Refine Results
  1. 721

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
    Get full text
  2. 722
  3. 723

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 724

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 725

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  6. 726

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors by Michael R. Giordano (9976173)

    Published 2021
    “…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …”
  7. 727

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    article
  8. 728

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 729

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    article
  10. 730

    Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration by Saideep Pavuluri (21792941)

    Published 2025
    “…Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
  11. 731

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  12. 732