Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 141 - 148 results of 148 for search '(( elements method algorithm ) OR ((( text processing algorithm ) OR ( relevant data algorithm ))))', query time: 0.10s Refine Results
  1. 141

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 142
  3. 143

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
  4. 144

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…</p><h3>Methods</h3><p dir="ltr">We searched 7 of the most popular bibliographic databases using 3 groups of search terms related to diabetes, WDs, and AI. A 2-stage process was followed for study selection: reading abstracts and titles followed by full-text screening. …”
  5. 145

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  6. 146

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
  7. 147
  8. 148