Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
text modeling » agent modeling (Expand Search), event modeling (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
text modeling » agent modeling (Expand Search), event modeling (Expand Search)
element » elements (Expand Search)
-
61
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
62
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
63
Downlink channel estimation for IMT-DS
Published 2001“…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
Get full text
Get full text
article -
64
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
65
-
66
-
67
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
68
Intelligent Hybrid Feature Selection for Textual Sentiment Classification
Published 2021“…Finally, for textual sentiment classification, the well-known classification algorithms Support Vector Machine (SVM), Naive Bayes (NB), Generalized Linear Model (GLM) are trained in the ensemble model on the refined sentiment feature set. …”
-
69
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…To categorize electronic text in these two cases, deep learning models such as convolutional neural networks and recurrent neural networks and a combination of CNN-RNN were trained on this data. …”
Get full text
-
70
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
71
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
72
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
73
-
74
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
76
-
77
-
78
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
Get full text
Get full text
Get full text
article -
79
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
-
80