Showing 81 - 100 results of 126 for search '(( element data algorithm ) OR ((( implement finding algorithm ) OR ( relevant study algorithm ))))', query time: 0.12s Refine Results
  1. 81

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 82

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 83

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  4. 84

    Performance Prediction Using Classification by MOOLIYIL, GITA

    Published 2019
    “…Principal component analysis and feature selection by weights using information gain ratio, Gini index, correlation and PCA is used to determine the relevant predictors of the datasets used. This study also addresses gaps in the current available literature on performance prediction, such as data imbalance and the use of Ensemble models. …”
    Get full text
  5. 85

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
    Get full text
    Get full text
    article
  6. 86

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
    Get full text
  7. 87

    A simulated annealing-based optimal controller for a three phase induction motor by Mantawy, A.H.

    Published 2002
    “…An adaptive cooling schedule and a new method for variables discretization are implemented to enhance the speed and convergence of the original simulated annealing algorithm (SAA). …”
    Get full text
    Get full text
    article
  8. 88
  9. 89

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  10. 90

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Therefore, in this study, we conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
    Get full text
    Get full text
  11. 91

    Cardiovascular health research priorities in the United Arab Emirates by Ghader, Nariman

    Published 2023
    “…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …”
    Get full text
    article
  12. 92
  13. 93

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
  14. 94

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…The study platform described the technology-based approaches with the appreciation of new ideas for secure money transactions. …”
  15. 95

    A collaborative filtering recommendation framework utilizing social networks by Aamir Fareed (17019087)

    Published 2023
    “…The framework is based on a modified version of the user-based collaborative filtering algorithm, which computes user similarity based on their ratings and social connections. …”
  16. 96

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…This essentially makes it easy to detect fraud and thus prevents it from happening. The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
    Get full text
  17. 97
  18. 98

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba, Sulaiman

    Published 2025
    “…Most of the included studies focused on mortality prediction, utilizing datasets of varying sizes and diverse ML algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  19. 99

    Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective by Zhitao Xu (2426023)

    Published 2024
    “…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …”
  20. 100

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
    Get full text