Search alternatives:
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
text » test (Expand Search)
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
text » test (Expand Search)
-
21
-
22
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
23
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
24
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation
Published 2024“…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
25
-
26
-
27
-
28
-
29
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
30
-
31
-
32
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
Get full text
Get full text
-
33
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Informal Arabic lacks standardization and has no grammar, thus sentimental analysis in this area is considered a complex process. Sentiment Analysis for Arabic has been studied for MSA (Modern Standard Arabic) but rarely for informal Arabic, and non-existent for Arabizi; whereas most of the youth in Lebanon text in Arabizi claiming that it is easier than texting in Arabic. …”
Get full text
Get full text
masterThesis -
34
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
Get full text
Get full text
Get full text
Get full text
article -
35
-
36
-
37
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …”
Get full text
-
38
-
39
A Multi-Channel Convolutional Neural Network approach to automate the citation screening process
Published 2021“…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …”
-
40
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”