Search alternatives:
processing algorithm » processing algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 41 - 60 results of 112 for search '(((( task scheduling algorithm ) OR ( text processing algorithm ))) OR ( element data algorithm ))', query time: 0.14s Refine Results
  1. 41
  2. 42
  3. 43

    An Infrastructure-Assisted Workload Scheduling for Computational Resources Exploitation in the Fog-Enabled Vehicular Network by Sorkhoh, Ibrahim

    Published 2020
    “…This article proposes an infrastructure-assisted task scheduling scheme where the roadside unit receives computational tasks from different sources and schedules these tasks over a computationally capable vehicle residing within the roadside unit’s range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 44

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  5. 45

    Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation by Attieh, Joseph

    Published 2024
    “…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
    Get full text
    Get full text
  14. 54

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…Informal Arabic lacks standardization and has no grammar, thus sentimental analysis in this area is considered a complex process. Sentiment Analysis for Arabic has been studied for MSA (Modern Standard Arabic) but rarely for informal Arabic, and non-existent for Arabizi; whereas most of the youth in Lebanon text in Arabizi claiming that it is easier than texting in Arabic. …”
    Get full text
    Get full text
    masterThesis
  15. 55

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 56
  17. 57
  18. 58

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic by AL MANSOORI, MOUZA

    Published 2021
    “…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
    Get full text
  19. 59

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 60