بدائل البحث:
multi algorithm » mould algorithm (توسيع البحث), auction algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
multi algorithm » mould algorithm (توسيع البحث), auction algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
-
681
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
منشور في 2022"…As part of this work, two deep learning models are compared according to their performance. …"
احصل على النص الكامل
-
682
SemIndex: Semantic-Aware Inverted Index
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
683
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
منشور في 2022"…The performance of the models is measured using the metrics accuracy, precision, recall, F1 score, detection time per flow, and ROC curves. …"
-
684
-
685
Don't understand a measure? Learn it: Structured Prediction for Coreference Resolution optimizing its measures
منشور في 2017"…Most interestingly, we show that such functions can be (i) automatically learned also from controversial but commonly accepted coreference measures, e.g., MELA, and (ii) successfully used in learning algorithms. The accurate model comparison on the standard CoNLL-2012 setting shows the benefit of more expressive loss functions.…"
-
686
Humanizing AI in medical training: ethical framework for responsible design
منشور في 2023"…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …"
-
687
-
688
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
689
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…In this paper, we proposed a transport-control model that exploits cyber-physical systems (CPS) and sensor-technology to continuously monitor and mine the big city data for smart decision-making. …"
-
690
-
691
Artificial Intelligence for Skin Cancer Detection: Scoping Review
منشور في 2021"…The studies used up to 11 evaluation metrics to assess the proposed models, where 39 studies used accuracy as the primary evaluation metric. …"
-
692
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
693
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
منشور في 2021"…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …"
احصل على النص الكامل
-
694
The role of Reinforcement Learning in software testing
منشور في 2023"…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
-
695
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
منشور في 2023"…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
696
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
منشور في 2023"…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
-
697
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
منشور في 2021"…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
-
698
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
احصل على النص الكامل
-
699
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
منشور في 2024"…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …"
-
700
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…"
احصل على النص الكامل
masterThesis