-
41
Evaluation of Hierarchical Clustering Methodologies for Identifying Patterns in Timeout Requests in EuroLeague Basketball
Published 2025-07-01“…This study evaluates hierarchical clustering methodologies to identify patterns associated with timeout requests for EuroLeague basketball games. Using play-by-play data from 3743 games spanning the 2008–2023 seasons (over 1.9 million instances), we applied Principal Component Analysis to reduce dimensionality and tested multiple agglomerative and divisive clustering techniques (e.g., Ward and DIANA) with different distance metrics (Euclidean, Manhattan, and Minkowski). …”
Get full text
Article -
42
Calls to action and user engagement: The role of visual and verbal requests in nonprofit advocacy on Facebook
Published 2025-05-01“…We address this gap through a quantitative content analysis of 2250 Facebook posts from the 100 largest U.S. nonprofit organizations. Using a social semiotics lens, we argue that both verbal and visual modes can convey requests, although each relies on distinct semiotic resources. …”
Get full text
Article -
43
Federated Learning-Driven IoT Request Scheduling for Fault Tolerance in Cloud Data Centers
Published 2025-07-01“…After that, locally trained models are combined, and the resulting model is fed into the global aggregation model. Finally, using a weighted round-robin method, the task assigner allocates incoming IoT service requests to virtual machines. …”
Get full text
Article -
44
-
45
-
46
Inspecting Pragmatic Analysis of Strategies Employed by Iranian EFL Learners in Realization of the Speech Act of Requests
Published 2025-03-01“…The present paper explores the use of pragmatic strategies by Iranian EFL learners in fulfilling the speech act of request. …”
Get full text
Article -
47
Analysis of a semi-open queueing network with adaptation of service rates to the rates of arriving requests
Published 2025-07-01“…The obtained results can be used to optimize the functioning of various real objects described by semi-open queueing networks, for example, telecommunication and logistic systems, mobile robotic fulfillment systems, by adapting the distribution of network resources between its nodes to the changing rate of incoming requests…”
Get full text
Article -
48
The struggle over caesarean section on maternal request: an ethical principles approach to Swedish media portrayal
Published 2025-06-01“…An ethical principles approach is used to investigate what image of CSMR is created and conveyed to the public and what main arguments are used for and against CSMR. …”
Get full text
Article -
49
The Role of Requests for Information in Governing Digital Platforms Under the Digital Services Act: The Case of X
Published 2025-03-01“…This paper examines the transparency of the DSA enforcement process, focusing on the legal and political motivations of the progression from requests for information (RFIs) to the initiation of proceedings, using the European Commission’s investigation against X as a case study.…”
Get full text
Article -
50
Closed Gordon – Newell network with single-line poles and exponentially limited request waiting time
Published 2023-12-01“…Requests at poles and requests that did not get the service are moving through the network in accordance with different routing matrices. …”
Get full text
Article -
51
An Improved Large Neighborhood Search Algorithm for the Comprehensive Container Drayage Problem with Diverse Transport Requests
Published 2025-05-01“…Although various types of transport requests have been defined in the literature, no comprehensive study has addressed all of them together yet, due to the lack of an efficient model and corresponding algorithms. …”
Get full text
Article -
52
Audit at the request of a member of a business entity: issues of legal identification and law enforcement
Published 2023-11-01“…The legal identification of an audit at the request of a participant in a business company as mandatory was carried out using the method of analogy and the formal legal method.Analysis. …”
Get full text
Article -
53
-
54
Automatic Speech Recognition Training Software for Joint Terminal Attack Controller Close Air Support Requests
Published 2022-05-01“…However, these technologies have yet to become a feature of most training systems. Using SoarTech’s SpeechZero ASR software, an individual speaks their 9-line request into a tablet or smartphone which will parse the speech and use AI algorithms to categorize it within the 9-line framework. …”
Get full text
Article -
55
Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms
Published 2025-04-01“…Second, we conducted text classification experiments using various machine learning algorithms, ranging from traditional methods to advanced large language models (LLMs), to categorize the requests into three classes. …”
Get full text
Article -
56
Requests for support by pregnant women with eating disorder symptoms: a systematic literature review of qualitative studies
Published 2025-04-01“…From these studies three themes emerged: wish for support from health care, wish to get support from a partner and wish to use self-help strategies. Conclusion This review found a knowledge gap regarding the type of support requested by pregnant women with ED symptoms. …”
Get full text
Article -
57
Location-Aware Web Service Composition Based on the Mixture Rank of Web Services and Web Service Requests
Published 2019-01-01“…Comparisons are used to evaluate our method. Comparisons show that GLLB reduces the value of NUR (Number of Unfinished service Requests), FV (Failure Value), and AFV (Average Failure Value).…”
Get full text
Article -
58
Integrating Pull Request Comment Analysis and Developer Profiles for Expertise-Based Recommendations in Global Software Development
Published 2025-01-01“…Typical developer recommendation systems do not consider the dynamics of expertise and cooperative nature of the tasks for assessing their correctness, often restricting themselves to extracting review comments only to measure their usefulness and suggest reviewers. This research intends to create a recommendation system using pull request review comments and selected data from developers’ profiles to recommend better experts based on their dynamic expertise. …”
Get full text
Article -
59
Audit of Histopathology Request Forms in a Teaching Hospital: Assessing the Adequacy of Clinician-Provided Information for Diagnosis
Published 2025-04-01“…Methods and Materials: There was a standardized histopathology request form that all the departments across the hospital used to send their requests for histopathological examination. …”
Get full text
Article -
60
Improving Cultural Heritage conservation: LSTM neural networks to effectively processing end-user’s maintenance requests
Published 2023-04-01“…In a Cultural Heritage building in Italy, hosting a University Campus, data about end-user’s maintenance requests collected for 34 months were analysed, and LSTM neural networks were trained to predict the category of each request. …”
Get full text
Article