Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
case modeling » based modeling (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
case modeling » based modeling (Expand Search)
-
421
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
422
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
423
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
Get full text
Get full text
Get full text
article -
424
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
-
425
Dynamic single node failure recovery in distributed storage systems
Published 2017“…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
426
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
Get full text
Get full text
Get full text
article -
427
ISSP
Published 2017“…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
Get full text
Get full text
Get full text
conferenceObject -
428
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
429
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
430
Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort
Published 2024“…Linear regression analysis revealed that MLR and clozapine treatment were significantly correlated with the severity of schizophrenia symptoms. The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
-
431
-
432
Condenser capacity and hyperbolic perimeter
Published 2022“…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
-
433
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
434
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …”
-
435
Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context
Published 0024“…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
Get full text
-
436
Towards Multimedia Fragmentation
Published 2006“…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
437
Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review
Published 2022“…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
-
438
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
Get full text
-
439
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
440
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article