بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
element deer » elementi per (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
element deer » elementi per (توسيع البحث)
-
21
-
22
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
23
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …"
-
24
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation
منشور في 2024"…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
25
-
26
-
27
-
28
-
29
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
30
-
31
-
32
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …"
احصل على النص الكامل
احصل على النص الكامل
-
33
Sentiment analysis for Arabizi in social media. (c2015)
منشور في 2015"…Informal Arabic lacks standardization and has no grammar, thus sentimental analysis in this area is considered a complex process. Sentiment Analysis for Arabic has been studied for MSA (Modern Standard Arabic) but rarely for informal Arabic, and non-existent for Arabizi; whereas most of the youth in Lebanon text in Arabizi claiming that it is easier than texting in Arabic. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
34
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
منشور في 2015"…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
35
-
36
-
37
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
منشور في 2021"…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. In this study, we used twitter as our data source. …"
احصل على النص الكامل
-
38
-
39
A Multi-Channel Convolutional Neural Network approach to automate the citation screening process
منشور في 2021"…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …"
-
40
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"