Showing 361 - 370 results of 370 for search '(((( implement modeling algorithm ) OR ( element data algorithm ))) OR ( level using algorithm ))*', query time: 0.10s Refine Results
  1. 361

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    article
  2. 362
  3. 363
  4. 364

    Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection by Ahmad Yaser Alhaddad (7017434)

    Published 2022
    “…We also review methods that use machine learning algorithms to predict blood glucose trends, especially for high risk events such as hypoglycemia. …”
  5. 365

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  6. 366

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  7. 367

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities by Muhammad Mazhar Rathore (17051745)

    Published 2021
    “…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
  8. 368

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  9. 369

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  10. 370

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review by Zainab Jan (17306614)

    Published 2021
    “…</p><h3>Objective</h3><p dir="ltr">This review aims to explore the machine learning algorithms used for the detection and diagnosis of bipolar disorder and its subtypes.…”