Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
finding » findings (Expand Search)
-
241
A fine-grained XML structural comparison approach
Published 2007“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
242
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
243
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
-
244
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
Get full text
Get full text
Get full text
article -
245
-
246
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …”
-
247
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
248
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
249
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
250
Scatter search technique for exam timetabling
Published 2011“…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
Get full text
Get full text
Get full text
article -
251
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
252
Exploring AI Conversational Chatbot UX Design: Insights from High School
Published 2025“…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
Get full text
-
253
-
254
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
255
-
256
Arabic Hotel Reviews Sentiment Analysis Using Deep Learning
Published 2023“…On the other hand, the DT model had the lowest scores among all the models, with values of 66% and 68%. The findings of this study contribute to the growing body of research in sentiment analysis and provide valuable insights into sentiment patterns specific to Arabic hotel reviews. …”
Get full text
-
257
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. Several dataset analysis models are utilised to study the data diversity. …”
-
258
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. …”
Get full text
Get full text
-
259
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…</p><h3>Methods</h3><p dir="ltr">This study consists of two parts. In the first part, we employ NLP techniques and machine learning algorithms to extract and analyze tweets containing keywords related to loneliness. …”
-
260
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
Get full text