بدائل البحث:
multi algorithm » mould algorithm (توسيع البحث), auction algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
multi algorithm » mould algorithm (توسيع البحث), auction algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
-
721
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …"
احصل على النص الكامل
article -
722
A quadratic kernel for 3-set packing
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
723
Comparative Study on Arabic Text Classification: Challenges and Opportunities
منشور في 2022"…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …"
احصل على النص الكامل
-
724
-
725
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
726
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
727
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
728
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
منشور في 2021"…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …"
-
729
An XML Document Comparison Framework
منشور في 2001"…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
730
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
731
Approximate XML structure validation technical report
منشور في 2014"…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
732
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
منشور في 2025"…Insights from this study can be used for improving pore network models and training machine learning algorithms.…"
-
733
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
734