Search alternatives:
processing algorithm » processing algorithms (Expand Search)
element processing » melt processing (Expand Search)
codingnb algorithm » cosine algorithm (Expand Search)
g algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
element g » elements _ (Expand Search), clement k (Expand Search)
processing algorithm » processing algorithms (Expand Search)
element processing » melt processing (Expand Search)
codingnb algorithm » cosine algorithm (Expand Search)
g algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
element g » elements _ (Expand Search), clement k (Expand Search)
-
21
Optical recognition of electrical circuit drawings
Published 1997Get full text
Get full text
article -
22
Communications in electronic textile systems
Published 2017“…A new algorithm based on token grid schemes is presented that takes advantage of the e-textile physical configuration.…”
Get full text
Get full text
Get full text
conferenceObject -
23
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
24
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
-
25
-
26
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
27
-
28
-
29
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
-
30
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?, ∗, MinOccurs, MaxOccurs, etc.). …”
Get full text
Get full text
Get full text
Get full text
article -
31
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?, *, MinOccurs, MaxOccurs, etc.). …”
Get full text
Get full text
Get full text
article