Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 861 - 880 results of 880 for search '(( element update algorithm ) OR ((( data processing algorithm ) OR ( model using algorithm ))))', query time: 0.13s Refine Results
  1. 861

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. …”
  2. 862

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  3. 863
  4. 864
  5. 865

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review by Loay A. Salman (14150322)

    Published 2023
    “…All included studies were published between 2021 and 2022, with a total of nine different AI algorithms reported. Among these AI models, the accuracy of TKA femoral component sizing prediction ranged from 88.3 to 99.7% within a deviation of one size, while tibial component sizing exhibited an accuracy ranging from 90 to 99.9% ± 1 size.…”
  6. 866

    Seasonal variations in feed-water chemistry and fouling dynamics of reverse-osmosis systems: A global climate lens by Nasser Zareei (22921226)

    Published 2025
    “…Future installations should align membrane materials, pretreatment systems, and control algorithms with site-specific hydrological calendars.…”
  7. 867

    A fine-grained XML structural comparison approach by Tekli, Joe

    Published 2007
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 868

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  9. 869

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…Models were through the use of four groups of approaches and 23 evaluation metrics. …”
  10. 870

    The architecture of a highly reconfigurable RISC dataflow array processor by Sait, Sadiq M.

    Published 2020
    “…This processor forms an element of a processor array which possess the features of both static and dynamic dataflow models. The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. …”
    Get full text
    article
  11. 871
  12. 872

    Comparative Study on Arabic Text Classification: Challenges and Opportunities by Abualigah, Laith

    Published 2022
    “…This paper presents a comparative study based on a list of chosen published papers that focus on improving Arabic text classifications, to highlight the given models and the used classifiers besides discussing the faced challenges in these types of researches, then this paper proposes the expected research opportunities in the field of text classification research. …”
    Get full text
  13. 873
  14. 874

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  15. 875

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors by Michael R. Giordano (9976173)

    Published 2021
    “…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …”
  16. 876

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 877

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    article
  18. 878

    Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration by Saideep Pavuluri (21792941)

    Published 2025
    “…Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
  19. 879

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  20. 880