Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
element » elements (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
element » elements (Expand Search)
-
141
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…</p><h2>Other Information</h2> <p> Published in: BioData Mining<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1186/s13040-021-00237-y" target="_blank">http://dx.doi.org/10.1186/s13040-021-00237-y</a></p>…”
-
142
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
143
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
Published 2020“…The fourth scenario resulted in diminished NCB, down by 245% for the case of daily automatic cleaning. Other findings of the study included higher tilt angles that resulted in lower cleaning requirements and thin-film PV panels that required less cleaning than first generation PV panels (mono/poly crystalline). …”
Get full text
Get full text
-
144
Charge and reduce
Published 2015“…This leads to an algorithm whose running time is O(1.6181kn).…”
Get full text
Get full text
Get full text
article -
145
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
Published 2020“…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
Get full text
article -
146
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
147
-
148
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
149
On the complexity of bilinear computations
Published 1984“…Arithmetic complexity theory is the study of the minimum number of non-scalar multiplications required to compute a set of bilinear forms. …”
Get full text
Get full text
Get full text
masterThesis -
150
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
Published 2017“…Especially in the loss-augmented setting, the need of finding the max-violating constraint has severely limited the expressivity of effective loss functions. …”
-
151
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
152
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
153
-
154
Deep learning-based user experience evaluation in distance learning
Published 2023“…More than 160,000 tweets, addressing conditions related to the major change in the education system, were gathered from Twitter social network and deep learning-based sentiment analysis models and topic models based on latent dirichlet allocation (LDA) algorithm were developed and analyzed. Long short term memory-based sentiment analysis model using word2vec embedding was used to evaluate the opinions of Twitter users during distance education and also, a topic model using the LDA algorithm was built to identify the discussed topics in Twitter. …”
-
155
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. Findings indicate that heuristic evaluation techniques are not so helpful in this domain; also, the model has generated interesting clusters about trending topics and events in Dubai. …”
Get full text
-
156
-
157
Automatic image quality evaluation in digital radiography using for‐processing and for‐presentation images
Published 2024“…No effect of additional filtration on any of the IQ metrics was detected on images of either type. An interesting finding of the study was that for all different image acquisition selections the d’ scores were larger in raw images, whereas the other IQ metrics were larger in clinical images for most of the cases.…”
-
158
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…The current research offers preliminary evidence with regard to the investigation of voice assistant adoption using the BRT that jointly examines enabling and inhibiting elements leading to consumers’ attitude formation. The study findings contribute to Human-Computer interaction literature by utilizing BRT framework which provides incremental evidence demonstrating a much broader and organic explanation of consumers’ cognition for the adoption of voice assistant technology. …”
-
159
-
160
The Effectiveness of Supervised Machine Learning in Screening and Diagnosing Voice Disorders: Systematic Review and Meta-analysis
Published 2022“…</p><h3>Methods</h3><p dir="ltr">An electronic search was conducted in 5 databases. Studies that examined the performance (accuracy, sensitivity, and specificity) of any ML algorithm in detecting pathological voice samples were included. …”