Search alternatives:
use » used (Expand Search)
Showing 41 - 60 results of 3,143 for search 'use request', query time: 0.11s Refine Results
  1. 41

    Evaluation of Hierarchical Clustering Methodologies for Identifying Patterns in Timeout Requests in EuroLeague Basketball by José Miguel Contreras, Elena Molina Portillo, Juan Manuel Fernández Luna

    Published 2025-07-01
    “…This study evaluates hierarchical clustering methodologies to identify patterns associated with timeout requests for EuroLeague basketball games. Using play-by-play data from 3743 games spanning the 2008–2023 seasons (over 1.9 million instances), we applied Principal Component Analysis to reduce dimensionality and tested multiple agglomerative and divisive clustering techniques (e.g., Ward and DIANA) with different distance metrics (Euclidean, Manhattan, and Minkowski). …”
    Get full text
    Article
  2. 42

    Calls to action and user engagement: The role of visual and verbal requests in nonprofit advocacy on Facebook by Fabienne Bünzli, Martin J. Eppler

    Published 2025-05-01
    “…We address this gap through a quantitative content analysis of 2250 Facebook posts from the 100 largest U.S. nonprofit organizations. Using a social semiotics lens, we argue that both verbal and visual modes can convey requests, although each relies on distinct semiotic resources. …”
    Get full text
    Article
  3. 43

    Federated Learning-Driven IoT Request Scheduling for Fault Tolerance in Cloud Data Centers by Sheeja Rani S, Raafat Aburukba

    Published 2025-07-01
    “…After that, locally trained models are combined, and the resulting model is fed into the global aggregation model. Finally, using a weighted round-robin method, the task assigner allocates incoming IoT service requests to virtual machines. …”
    Get full text
    Article
  4. 44
  5. 45
  6. 46

    Inspecting Pragmatic Analysis of Strategies Employed by Iranian EFL Learners in Realization of the Speech Act of Requests by Jamshid Mashhadi, mehran memari

    Published 2025-03-01
    “…The present paper explores the use of pragmatic strategies by Iranian EFL learners in fulfilling the speech act of request. …”
    Get full text
    Article
  7. 47

    Analysis of a semi-open queueing network with adaptation of service rates to the rates of arriving requests by A. N. Dudin, O. S. Dudina, S. A. Dudin

    Published 2025-07-01
    “…The obtained results can be used to optimize the functioning of various real objects described by semi-open queueing networks, for example, telecommunication and logistic systems, mobile robotic fulfillment systems, by adapting the distribution of network resources between its nodes to the changing rate of incoming requests…”
    Get full text
    Article
  8. 48

    The struggle over caesarean section on maternal request: an ethical principles approach to Swedish media portrayal by Mio Fredriksson, Magdalena Mattebo

    Published 2025-06-01
    “…An ethical principles approach is used to investigate what image of CSMR is created and conveyed to the public and what main arguments are used for and against CSMR. …”
    Get full text
    Article
  9. 49

    The Role of Requests for Information in Governing Digital Platforms Under the Digital Services Act: The Case of X by Matteo Fabbri

    Published 2025-03-01
    “…This paper examines the transparency of the DSA enforcement process, focusing on the legal and political motivations of the progression from requests for information (RFIs) to the initiation of proceedings, using the European Commission’s investigation against X as a case study.…”
    Get full text
    Article
  10. 50

    Closed Gordon – Newell network with single-line poles and exponentially limited request waiting time by Yu. V. Malinkovsky, V. A. Nemilostivaya

    Published 2023-12-01
    “…Requests at poles and requests that did not get the service are moving through the network in accordance with different routing matrices. …”
    Get full text
    Article
  11. 51

    An Improved Large Neighborhood Search Algorithm for the Comprehensive Container Drayage Problem with Diverse Transport Requests by Xuhui Yu, Cong He

    Published 2025-05-01
    “…Although various types of transport requests have been defined in the literature, no comprehensive study has addressed all of them together yet, due to the lack of an efficient model and corresponding algorithms. …”
    Get full text
    Article
  12. 52

    Audit at the request of a member of a business entity: issues of legal identification and law enforcement by E. A. Bochkareva

    Published 2023-11-01
    “…The legal identification of an audit at the request of a participant in a business company as mandatory was carried out using the method of analogy and the formal legal method.Analysis. …”
    Get full text
    Article
  13. 53
  14. 54

    Automatic Speech Recognition Training Software for Joint Terminal Attack Controller Close Air Support Requests by Logan Gisick, Henry Phillips, Charles Newton

    Published 2022-05-01
    “…However, these technologies have yet to become a feature of most training systems. Using SoarTech’s SpeechZero ASR software, an individual speaks their 9-line request into a tablet or smartphone which will parse the speech and use AI algorithms to categorize it within the 9-line framework. …”
    Get full text
    Article
  15. 55

    Augmentation and Classification of Requests in Moroccan Dialect to Improve Quality of Public Service: A Comparative Study of Algorithms by Hajar Zaidani, Rim Koulali, Abderrahim Maizate, Mohamed Ouzzif

    Published 2025-04-01
    “…Second, we conducted text classification experiments using various machine learning algorithms, ranging from traditional methods to advanced large language models (LLMs), to categorize the requests into three classes. …”
    Get full text
    Article
  16. 56

    Requests for support by pregnant women with eating disorder symptoms: a systematic literature review of qualitative studies by Cecilia Brundin Pettersson, Klara Lundvik, Martina Isaksson, Mia Ramklint

    Published 2025-04-01
    “…From these studies three themes emerged: wish for support from health care, wish to get support from a partner and wish to use self-help strategies. Conclusion This review found a knowledge gap regarding the type of support requested by pregnant women with ED symptoms. …”
    Get full text
    Article
  17. 57

    Location-Aware Web Service Composition Based on the Mixture Rank of Web Services and Web Service Requests by Junwen Lu, Guanfeng Liu, Keshou Wu, Wenjiang Qin

    Published 2019-01-01
    “…Comparisons are used to evaluate our method. Comparisons show that GLLB reduces the value of NUR (Number of Unfinished service Requests), FV (Failure Value), and AFV (Average Failure Value).…”
    Get full text
    Article
  18. 58

    Integrating Pull Request Comment Analysis and Developer Profiles for Expertise-Based Recommendations in Global Software Development by Sara Zamir, Abdul Rehman, Hufsa Mohsin, Elif Zamir, Assad Abbas, Fuad A. M. Al-Yarimi

    Published 2025-01-01
    “…Typical developer recommendation systems do not consider the dynamics of expertise and cooperative nature of the tasks for assessing their correctness, often restricting themselves to extracting review comments only to measure their usefulness and suggest reviewers. This research intends to create a recommendation system using pull request review comments and selected data from developers’ profiles to recommend better experts based on their dynamic expertise. …”
    Get full text
    Article
  19. 59

    Audit of Histopathology Request Forms in a Teaching Hospital: Assessing the Adequacy of Clinician-Provided Information for Diagnosis by Adekunle AA, Oladimeji AO, Ayo-Aderibigbe O, Idowu NA, Rasheed MW, Ano-Edwarde GH

    Published 2025-04-01
    “…Methods and Materials: There was a standardized histopathology request form that all the departments across the hospital used to send their requests for histopathological examination. …”
    Get full text
    Article
  20. 60

    Improving Cultural Heritage conservation: LSTM neural networks to effectively processing end-user’s maintenance requests by Marco D'Orazio, Gabriele Bernardini, Elisa Di Giuseppe

    Published 2023-04-01
    “…In a Cultural Heritage building in Italy, hosting a University Campus, data about end-user’s maintenance requests collected for 34 months were analysed, and LSTM neural networks were trained to predict the category of each request. …”
    Get full text
    Article