Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
case modeling » based modeling (Expand Search)
Showing 421 - 440 results of 469 for search '(((( case modeling algorithm ) OR ( data processing algorithm ))) OR ( elements model algorithm ))', query time: 0.11s Refine Results
  1. 421

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  2. 422
  3. 423

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
    Get full text
    Get full text
    Get full text
    article
  4. 424

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
  5. 425

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 426

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
    Get full text
    Get full text
    Get full text
    article
  7. 427

    ISSP by Zouein, P.P.

    Published 2017
    “…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 428

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation by Getahun, Fekade

    Published 2007
    “…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 429
  10. 430

    Peripheral inflammatory and metabolic markers as potential biomarkers in treatment-resistant schizophrenia: Insights from a Qatari Cohort by Mohamed Adil Shah Khoodoruth (14589828)

    Published 2024
    “…Linear regression analysis revealed that MLR and clozapine treatment were significantly correlated with the severity of schizophrenia symptoms. The Random Forest model, a supervised machine learning algorithm, efficiently differentiated between cases and controls and between TRS and NTRS, with accuracies of 86.87 % and 88.41 %, respectively. …”
  11. 431
  12. 432

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
  13. 433

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  14. 434

    Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization by Yassine Himeur (14158821)

    Published 2023
    “…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …”
  15. 435

    Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context by SALIM, MAHA JAWDAT

    Published 0024
    “…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
    Get full text
  16. 436

    Towards Multimedia Fragmentation by Saad, Samir

    Published 2006
    “…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 437

    Overview of Artificial Intelligence–Driven Wearable Devices for Diabetes: Scoping Review by Arfan Ahmed (17541309)

    Published 2022
    “…WDs coupled with artificial intelligence (AI) algorithms show promise to help understand and conclude meaningful information from the gathered data and provide advanced and clinically meaningful analytics.…”
  18. 438

    Machine Learning Techniques for Pharmaceutical Bioinformatics by SULTAN, AHMED ATTA AHMED

    Published 2018
    “…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
    Get full text
  19. 439
  20. 440

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article