Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
prevalence data » prevalence years (Expand Search)
pass algorithm » jaya algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
prevalence data » prevalence years (Expand Search)
pass algorithm » jaya algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
1
-
2
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
3
-
4
-
5
-
6
-
7
-
8
-
9
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
10
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…While Information Retrieval (IR) systems have gained success in Web-style search engines in the past two decades, nonetheless, the DataBase (DB) paradigm remains prevalent in handling data in enterprise environments and digital libraries, and is gaining even more importance in the Semantic Web with the increasing need to handle partly structured (NoSQL) data. …”
Get full text
Get full text
Get full text
Get full text
article -
12
-
13
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
Get full text
Get full text
masterThesis -
14
-
15
-
16
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…Nevertheless, the rapid growth of IoT devices has introduced significant security concerns like device vulnerabilities, unauthorized access, and potential data breaches.This article deals with an immediate call to empower IoT resilience against a wide range of sophisticated and prevalent cybersecurity threats. …”
-
17
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…The performance of our approach is gauged against the traditional multi-label Naïve Bayes (MLNB) algorithm and is quantified through a suite of evaluation metrics. …”
-
18
-
19
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…Techniques such as tree maps and radar plots are utilized to transform the analyzed data into visually appealing representations.</p><h3>Results</h3><p dir="ltr">The analysis of Twitter data yields valuable knowledge about the prevalence and nature of themes and topics associated with loneliness. …”
-
20