Showing 241 - 260 results of 296 for search '(( element data algorithm ) OR ((( study finding algorithm ) OR ( data making algorithm ))))', query time: 0.13s Refine Results
  1. 241

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 242

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  3. 243

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
  4. 244

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  5. 245
  6. 246

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …”
  7. 247

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  8. 248

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 249

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  10. 250

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  11. 251

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 252

    Exploring AI Conversational Chatbot UX Design: Insights from High School by Suha Khalil Assayed

    Published 2025
    “…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
    Get full text
  13. 253
  14. 254

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
  15. 255
  16. 256

    Arabic Hotel Reviews Sentiment Analysis Using Deep Learning by ALMANSOORI, MOHAMMAD

    Published 2023
    “…On the other hand, the DT model had the lowest scores among all the models, with values of 66% and 68%. The findings of this study contribute to the growing body of research in sentiment analysis and provide valuable insights into sentiment patterns specific to Arabic hotel reviews. …”
    Get full text
  17. 257

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…Based on publicly available datasets, several machine learning models are comprehensively analysed across different fingerprints and toolkits to find the best suitable models. Several dataset analysis models are utilised to study the data diversity. …”
  18. 258

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques by SALLOUM, SAID

    Published 2022
    “…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. …”
    Get full text
    Get full text
  19. 259

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">This study consists of two parts. In the first part, we employ NLP techniques and machine learning algorithms to extract and analyze tweets containing keywords related to loneliness. …”
  20. 260

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…In this study, I conduct a performance evaluation and comparison for various DL algorithms (LSTM, GRU, LSTM-ATT, CNN-BLSTM, CNN-LSTM, CNN-BILSTM-LSTM, and LSTM-TCN) on different datasets of Arabic cyberbullying to obtain more precise and dependable findings. …”
    Get full text