بدائل البحث:
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
jaya » maya (توسيع البحث), aya (توسيع البحث), jana (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
jaya » maya (توسيع البحث), aya (توسيع البحث), jana (توسيع البحث)
-
501
Predicting Android Malware Using Evolution Networks
منشور في 2025"…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
502
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
503
A fine-grained XML structural comparison approach
منشور في 2007"…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
504
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
505
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
احصل على النص الكامل
احصل على النص الكامل
-
506
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
منشور في 2020احصل على النص الكامل
doctoralThesis -
507
Current trends and future orientation in diagnosing lung pathologies: A systematic survey
منشور في 2025"…Additionally, it emphasized the necessity for further research to optimize their performance and clinical usefulness.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
508
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"