Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 841 - 860 results of 888 for search '(((( data processing algorithm ) OR ( model using algorithm ))) OR ( element data algorithm ))', query time: 0.13s Refine Results
  1. 841

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…The performance of the models is measured using the metrics accuracy, precision, recall, F1 score, detection time per flow, and ROC curves. …”
  2. 842

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns by JA’AROUN, WAED YOUSEF

    Published 2024
    “…However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …”
    Get full text
  3. 843
  4. 844

    Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures by Iryna Haponchyk (19691701)

    Published 2017
    “…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. The accurate model comparison on the standard CoNLL-2012 setting shows the benefit of more expressive loss functions.…”
  5. 845

    Humanizing AI in medical training: ethical framework for responsible design by Mohammed Tahri Sqalli (18420840)

    Published 2023
    “…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …”
  6. 846
  7. 847

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 848

    Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter by Yahia, Mohamed

    Published 2020
    “…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …”
    Get full text
    article
  9. 849

    Diagnostic test accuracy of AI-assisted mammography for breast imaging: a narrative review by Daksh Dave (17949239)

    Published 2025
    “…Artificial intelligence (AI), with its ability to process vast amounts of data and detect intricate patterns, offers a solution to the limitations of traditional mammography, including missed diagnoses and false positives. …”
  10. 850
  11. 851

    Artificial Intelligence for Skin Cancer Detection: Scoping Review by Abdulrahman Takiddin (14153181)

    Published 2021
    “…The studies used up to 11 evaluation metrics to assess the proposed models, where 39 studies used accuracy as the primary evaluation metric. …”
  12. 852

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  13. 853

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
    Get full text
  14. 854

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…In this context, the notion of fog computing has been projected to furnish data analytics and decision-making closer to the IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 855
  16. 856

    The role of Reinforcement Learning in software testing by Amr Abo-eleneen (17032284)

    Published 2023
    “…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
  17. 857

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
    Get full text
    Get full text
    Get full text
    article
  18. 858

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
  19. 859

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies by Farideh Abdollahi (22303153)

    Published 2024
    “…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …”
  20. 860

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
    Get full text
    article