يعرض 501 - 508 نتائج من 508 نتيجة بحث عن '(( elements jaya algorithm ) OR ((( data code algorithm ) OR ( based optimization algorithm ))))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 501

    Predicting Android Malware Using Evolution Networks حسب Chahine, Joy

    منشور في 2025
    "…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 502

    SemIndex: Semantic-Aware Inverted Index حسب Chbeir, Richard

    منشور في 2017
    "…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 503

    A fine-grained XML structural comparison approach حسب Tekli, Joe

    منشور في 2007
    "…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  4. 504

    An XML Document Comparison Framework حسب Tekli, Joe

    منشور في 2001
    "…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 505

    A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques حسب SALLOUM, SAID

    منشور في 2022
    "…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
    احصل على النص الكامل
    احصل على النص الكامل
  6. 506
  7. 507

    Current trends and future orientation in diagnosing lung pathologies: A systematic survey حسب Noorizadeh, Mohammad

    منشور في 2025
    "…Additionally, it emphasized the necessity for further research to optimize their performance and clinical usefulness.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 508

    Deep and transfer learning for building occupancy detection: A review and comparative analysis حسب Aya Nabil Sayed (17317006)

    منشور في 2022
    "…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"