Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data learning » deep learning (Expand Search)
-
361
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
Published 2020“…The study has made use of Google Meet© as an educational social platform in private higher education institutes. The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
Get full text
Get full text
-
362
-
363
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
364
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Additionally, we evaluate the performance of the best developed model with children. Machine learning algorithms experiments showed that XGBoost achieved the best performance across all metrics (e.g., accuracy of 90%) and provided fast predictions (i.e., 0.004 s) for the test samples. …”
-
365
CEAP
Published 2016“…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
Get full text
Get full text
Get full text
Get full text
article -
366
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
Get full text
-
367
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
368
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
369
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
370
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
371
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We build our model using machine learning techniques in particular rule-based models. …”
Get full text
Get full text
masterThesis -
372
LungVision: X-ray Imagery Classification for On-Edge Diagnosis Applications
Published 2024Get full text
article -
373
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
374
-
375
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
376
FoGMatch
Published 2019“…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
377
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…</p><h3>Conclusion</h3><p dir="ltr">AI algorithms show promise in detecting and subtyping medulloblastomas, but the findings are limited by overreliance on one dataset, small sample sizes, limited study numbers, and lack of meta-analysis Future research should develop larger, more diverse datasets and explore advanced approaches like deep learning and foundation models. …”
-
378
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…Consequently, the big data revolution has provided an opportunity to apply artificial intelligence and machine learning algorithms to mine such a vast data set. …”
-
379
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Before finding toxicity triggers, we built and evaluated various machine learning models to detect toxicity from Reddit comments. …”
-
380
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article