Results 11 to 20 of about 267,481 (220)

Retraction Note to: Automated query classification based web service similarity technique using machine learning [PDF]

open access: bronzeJournal of Ambient Intelligence and Humanized Computing, 2022
B. Saravana Balaji   +3 more
openalex   +2 more sources

CLASSIFICATION OF QUERY RECOMMENDATION USING QUERY SEMANTIC FLOW GRAPH TECHNIQUE ON NOVEL AOL LOG METHOD

open access: yesICTACT Journal on Soft Computing, 2021
Web mining is one among the thrust area of research in the data mining domain. The classification of query recommendation can be divided into two major classes that are document-based approach and log-based approach.
R Balakrishnan
doaj   +1 more source

Improving User Intent Detection in Urdu Web Queries with Capsule Net Architectures

open access: yesApplied Sciences, 2022
Detecting the communicative intent behind user queries is critically required by search engines to understand a user’s search goal and retrieve the desired results.
Sana Shams, Muhammad Aslam
doaj   +1 more source

Including Functional Annotations and Extending the Collection of Structural Classifications of Protein Loops (ArchDB)

open access: yesBioinformatics and Biology Insights, 2007
Loops represent an important part of protein structures. The study of loop is critical for two main reasons: First, loops are often involved in protein function, stability and folding.
Antoni Hermoso   +6 more
doaj   +2 more sources

iProm-phage: A two-layer model to identify phage promoters and their types using a convolutional neural network

open access: yesFrontiers in Microbiology, 2022
The increased interest in phages as antibacterial agents has resulted in a rise in the number of sequenced phage genomes, necessitating the development of user-friendly bioinformatics tools for genome annotation. A promoter is a DNA sequence that is used
Muhammad Shujaat   +4 more
doaj   +1 more source

Deep-Learning Based Injection Attacks Detection Method for HTTP

open access: yesMathematics, 2022
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao   +4 more
doaj   +1 more source

Random Forest Based Searching Approach for RDF

open access: yesIEEE Access, 2020
The blend of digital and physical worlds changed the Internet significantly. Accordingly, trends to collect, access, and deliver information have changed over the Web. Such changes raised the problems of information retrieval.
Hatem Soliman
doaj   +1 more source

Content-Based Discovery for Web Map Service using Support Vector Machine and User Relevance Feedback. [PDF]

open access: yesPLoS ONE, 2016
Many discovery methods for geographic information services have been proposed. There are approaches for finding and matching geographic information services, methods for constructing geographic information service classification schemes, and automatic ...
Kai Hu   +6 more
doaj   +1 more source

Bayesian semi-supervised classification of bacterial samples using MLST databases

open access: yesBMC Bioinformatics, 2011
Background Worldwide effort on sampling and characterization of molecular variation within a large number of human and animal pathogens has lead to the emergence of multi-locus sequence typing (MLST) databases as an important tool for studying the ...
Spratt Brian G   +4 more
doaj   +1 more source

BioReader: a text mining tool for performing classification of biomedical literature

open access: yesBMC Bioinformatics, 2019
Background Scientific data and research results are being published at an unprecedented rate. Many database curators and researchers utilize data and information from the primary literature to populate databases, form hypotheses, or as the basis for ...
Christian Simon   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy