Search alternatives:
using algorithms » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
Showing 561 - 580 results of 717 for search '(( data using algorithms ) OR ((( develop rd algorithm ) OR ( elements method algorithm ))))', query time: 0.10s Refine Results
  1. 561

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  2. 562

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 563

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
  4. 564
  5. 565
  6. 566

    Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis by Jithin Kalathikudiyil Sreedharan (18268894)

    Published 2024
    “…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
  7. 567

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 568
  9. 569

    Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review by Hiba Alzoubi (18001609)

    Published 2025
    “…Two reviewers independently conducted study selection, data extraction, and risk of bias assessment. Results were synthesized narratively. …”
  10. 570
  11. 571

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…Three reviewers independently extracted data from the included studies. A narrative approach was used for data synthesis.…”
  12. 572

    Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression by Alaa Abd-Alrazaq (17430900)

    Published 2023
    “…Further studies are needed to examine the performance of wearable AI based on a combination of wearable device data and neuroimaging data and to distinguish patients with depression from those with other diseases.…”
  13. 573

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations by Abbas, Nadine Fawaz

    Published 2017
    “…The proposed strategies are evaluated using simulations and experimental test bed measurements under realistic operational conditions. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 574

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
    Get full text
  15. 575

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 576

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
    Get full text
    Get full text
    article
  17. 577

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …”
    Get full text
    Get full text
    article
  18. 578

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  19. 579
  20. 580