Search Results - (( storage optimization path algorithm ) OR ( user identification search algorithm ))
Search alternatives:
- identification search »
- storage optimization »
- user identification »
- optimization path »
- path algorithm »
-
1
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The adjacency matrix is the naive storage structure of the algorithm. This storage structure has limited the use of the algorithm as it expands large storage space. …”
Get full text
Get full text
Conference or Workshop Item -
2
Effective predicate identification algorithm for XML retrieval
Published 2018“…Thus, the systems return irrelevant user search intentions. A search intention consists of entity nodes and predicate nodes of XML data. …”
Get full text
Get full text
Conference or Workshop Item -
3
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…The systems focus on user query representation, user search intention identification and ranking algorithms to improve keyword search. …”
Get full text
Get full text
Get full text
Thesis -
4
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In addition, it provides an input tool for user�s search preferences. The second component is the search process that is operated by a pattern matching. …”
Article -
5
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
6
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…The IEM algorithm uses the attraction-repulsion mechanism to change the positions of solutions towards the optimality. …”
Get full text
Get full text
Thesis -
7
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
8
Penentuan Kerelevanan Dokumen Menggunakan Rangkaian Rambatan Balik
Published 2002“…However, due to information overload, some search engines are still incapable of returning only the most relevant documents to the users. …”
Get full text
Get full text
Get full text
Thesis -
9
Effective keyword query structuring using NER for XML retrieval
Published 2015“…Algorithms were proposed that find user search intentions and convert the intentions into a set of ranked structured queries. …”
Get full text
Get full text
Article -
10
Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems
Published 2013Get full text
Get full text
Get full text
Citation Index Journal -
11
Comprehensive review of drones collision avoidance schemes: challenges and open issues
Published 2024“…We explore collision avoidance methods for UAVs from various perspectives, categorizing them into four main groups: obstacle detection and avoidance, collision avoidance algorithms, drone swarm, and path optimization. Additionally, our analysis delves into machine learning techniques, discusses metrics and simulation tools to validate collision avoidance systems, and delineates local and global algorithmic perspectives. …”
Get full text
Get full text
Get full text
Article -
12
An improved framework for content-based spamdexing detection
Published 2020“…This article is an attempt in that direction, where a framework has been proposed for spam web pages identification. The framework uses Stop words, Keywords Density, Spam Keywords Database, Part of Speech (POS) ratio, and Copied Content algorithms. …”
Get full text
Get full text
Get full text
Article -
13
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. The link-based web spam detection framework initially exposed the relationship network behind the link spamming and then used the paid-links database algorithm, spam signals algorithm, and improved link farms algorithm for link-based web spam identification. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Secure Access To Authorized Resources Based On Fingerprint Authentication
Published 2003“…The database can be manipulated (insertion, retrieving, and deletion) rapidly using the Adelson Velskii and Landis (AVL) tree searching technique. The A VL tree is used to increase the compression ratio as its compression algorithm works efficiently for all types of data. …”
Get full text
Get full text
Thesis -
15
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
16
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. …”
Get full text
Get full text
Article -
17
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
18
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…In addition, the improved WOA is developed by using Cauchy mutation and local search algorithm to solve its local optima problem and improve population diversity. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…The adaptive repository mechanism is a general scheme and can be embedded with high flexibility into any population-based evolutionary algorithm. Moreover, this work is extended to integrate the SPX crossover operator with the adaptive ARDE algorithm in a new way of implementation in order to make the adaptive ARDE algorithm satisfy both the global and local search requirements. …”
Get full text
Get full text
Thesis
