Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
case modeling » based modeling (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
case modeling » based modeling (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
161
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
Published 2022“…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. Five cities with growing populations, namely San Clara, CA, Salt Lake City, UT, Raleigh, NC, Denver, CO, and Los Angeles, CA, are chosen as case studies. …”
-
162
Optimization metaheuristic for software testing
Published 2013“…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
163
-
164
-
165
Lung nodule classification utilizing support vector machines
Published 2002“…Radiologists fail to diagnose small pulmonary nodules in as many as 30% of positive cases. Many methods have been proposed in the literature such as neural network algorithms. …”
Get full text
Get full text
article -
166
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
-
167
Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice
Published 2020“…The artificial neural network (ANN), support vector machine (SVM) and deep learning models, especially the convolutional neural network (CNN), are the most commonly used machine learning approaches where they proved to be performance in most cases. …”
-
168
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
Published 2020“…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
Get full text
Get full text
-
169
Predicting stability of classes in an object-oriented system
Published 2010“…Many metrics have been proposed to assess these software attributes and for this purpose, prediction models have been widely used. However, in almost all cases, these models were not efficient when used to predict the quality characteristics (stability or other) of new unseen software as their prediction accuracy decreases significantly. …”
Get full text
Get full text
Get full text
article -
170
UML-based regression testing for OO software
Published 2010“…We assume a test suite that contains both unit and system test cases. Based on the software changes reflected in the class and the interaction overview diagrams, our proposed technique selects test cases in phases. …”
Get full text
Get full text
Get full text
article -
171
A simple approach for testing web service based applications
Published 2005“…Three sets of test sequences are generated from the WSDL files, the TLTS and the TPG representing the integrated components and the whole web application. Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
172
Structural similarity evaluation between XML documents and DTDs
Published 2007“…We consider the various DTD operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes. Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
173
-
174
DAP: A dataset-agnostic predictor of neural network performance
Published 2024“…To this end, we propose a dataset-agnostic regression framework that uses a novel dual-LSTM model and a new dataset difficulty feature. The experimental results show that both tasks above are indeed feasible, and the proposed method outperforms the existing techniques in all experimental cases. …”
-
175
-
176
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…We evaluate the system performance in terms of secrecy capacity (SC) and outage probability (OP) for two network scenarios, namely non-cooperative (NCPS) and cooperative power saving (CPS) models. The NCPS case assumes fixed power at both source and relay while the CPS case assumes total average power shared between the source and relay. …”
-
177
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
Get full text
Get full text
Get full text
article -
178
Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis
Published 2023“…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
-
179
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…To categorize electronic text in these two cases, deep learning models such as convolutional neural networks and recurrent neural networks and a combination of CNN-RNN were trained on this data. …”
Get full text
-
180
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
Get full text
Get full text
Get full text
article