Showing 161 - 180 results of 195 for search '(((( complement rl algorithm ) OR ( element method algorithm ))) OR ( case modeling algorithm ))', query time: 0.12s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164

    Lung nodule classification utilizing support vector machines by Mousa, W.A.H.

    Published 2002
    “…Radiologists fail to diagnose small pulmonary nodules in as many as 30% of positive cases. Many methods have been proposed in the literature such as neural network algorithms. …”
    Get full text
    Get full text
    article
  5. 165

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice by Turker Tuncer (16677966)

    Published 2020
    “…The artificial neural network (ANN), support vector machine (SVM) and deep learning models, especially the convolutional neural network (CNN), are the most commonly used machine learning approaches where they proved to be performance in most cases. …”
  6. 166

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  7. 167

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  8. 168

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text
  9. 169

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…Many metrics have been proposed to assess these software attributes and for this purpose, prediction models have been widely used. However, in almost all cases, these models were not efficient when used to predict the quality characteristics (stability or other) of new unseen software as their prediction accuracy decreases significantly. …”
    Get full text
    Get full text
    Get full text
    article
  10. 170

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…We assume a test suite that contains both unit and system test cases. Based on the software changes reflected in the class and the interaction overview diagrams, our proposed technique selects test cases in phases. …”
    Get full text
    Get full text
    Get full text
    article
  11. 171

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 172

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…Three sets of test sequences are generated from the WSDL files, the TLTS and the TPG representing the integrated components and the whole web application. Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 173

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  14. 174

    DAP: A dataset-agnostic predictor of neural network performance by Sui Paul Ang (18460605)

    Published 2024
    “…To this end, we propose a dataset-agnostic regression framework that uses a novel dual-LSTM model and a new dataset difficulty feature. The experimental results show that both tasks above are indeed feasible, and the proposed method outperforms the existing techniques in all experimental cases. …”
  15. 175
  16. 176

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We evaluate the system performance in terms of secrecy capacity (SC) and outage probability (OP) for two network scenarios, namely non-cooperative (NCPS) and cooperative power saving (CPS) models. The NCPS case assumes fixed power at both source and relay while the CPS case assumes total average power shared between the source and relay. …”
  17. 177

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
    Get full text
    Get full text
    Get full text
    article
  18. 178

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  19. 179

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
  20. 180

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…To categorize electronic text in these two cases, deep learning models such as convolutional neural networks and recurrent neural networks and a combination of CNN-RNN were trained on this data. …”
    Get full text