Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 141 - 157 results of 157 for search '(( based sampling algorithm ) OR ((( relevant data algorithm ) OR ( element method algorithm ))))*', query time: 0.10s Refine Results
  1. 141

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 142

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  3. 143

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  4. 144

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
  5. 145

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  6. 146
  7. 147

    Using artificial intelligence to improve body iron quantification: A scoping review by Abdulqadir J. Nashwan (11659453)

    Published 2023
    “…The search revealed a wide range of machine learning algorithms used by different studies. Notably, most studies used a single data type. …”
  8. 148

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey by Noorizadeh, Mohammad

    Published 2025
    “…The CV processing method involves the application of advanced imaging techniques and machine learning algorithms to scrutinize and diagnose lung pathologies and ventilator-associated pneumonia (VAP). …”
    Get full text
    Get full text
    Get full text
    article
  9. 149

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Secondly, each of these methods is tested using three matching classification schemes; image projection with Linear Discriminant Functions (LDF), Multilinear Principal Component Analysis (MPCA) with K-Nearest Neighbor (KNN) classifier and the third method: MPCA plus Linear Discriminant Analysis (MPCA+LDA) with KNN classifier. Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
    Get full text
    article
  10. 150

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning by Gabriele Oligeri (14151426)

    Published 2022
    “…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
  11. 151

    Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks by Amirhossein Taherpour (19273879)

    Published 2024
    “…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …”
  12. 152
  13. 153
  14. 154

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”
  15. 155

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
  16. 156

    BioNetApp: An interactive visual data analysis platform for molecular expressions by Ali M. Roumani (18615124)

    Published 2019
    “…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
  17. 157

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article