Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
case modeling » based modeling (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 161 - 180 results of 200 for search '(( element update algorithm ) OR ((( case modeling algorithm ) OR ( element modeling algorithm ))))', query time: 0.12s Refine Results
  1. 161

    Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment by Safak Bayram (16925975)

    Published 2022
    “…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. Five cities with growing populations, namely San Clara, CA, Salt Lake City, UT, Raleigh, NC, Denver, CO, and Los Angeles, CA, are chosen as case studies. …”
  2. 162

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 163
  4. 164
  5. 165

    Lung nodule classification utilizing support vector machines by Mousa, W.A.H.

    Published 2002
    “…Radiologists fail to diagnose small pulmonary nodules in as many as 30% of positive cases. Many methods have been proposed in the literature such as neural network algorithms. …”
    Get full text
    Get full text
    article
  6. 166

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
  7. 167

    Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice by Turker Tuncer (16677966)

    Published 2020
    “…The artificial neural network (ANN), support vector machine (SVM) and deep learning models, especially the convolutional neural network (CNN), are the most commonly used machine learning approaches where they proved to be performance in most cases. …”
  8. 168

    Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic by Saeed Al-Maroof, Rana

    Published 2020
    “…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
    Get full text
    Get full text
  9. 169

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…Many metrics have been proposed to assess these software attributes and for this purpose, prediction models have been widely used. However, in almost all cases, these models were not efficient when used to predict the quality characteristics (stability or other) of new unseen software as their prediction accuracy decreases significantly. …”
    Get full text
    Get full text
    Get full text
    article
  10. 170

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…We assume a test suite that contains both unit and system test cases. Based on the software changes reflected in the class and the interaction overview diagrams, our proposed technique selects test cases in phases. …”
    Get full text
    Get full text
    Get full text
    article
  11. 171

    A simple approach for testing web service based applications by Tarhini, Abbas

    Published 2005
    “…Three sets of test sequences are generated from the WSDL files, the TLTS and the TPG representing the integrated components and the whole web application. Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 172

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…We consider the various DTD operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes. Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 173
  14. 174

    DAP: A dataset-agnostic predictor of neural network performance by Sui Paul Ang (18460605)

    Published 2024
    “…To this end, we propose a dataset-agnostic regression framework that uses a novel dual-LSTM model and a new dataset difficulty feature. The experimental results show that both tasks above are indeed feasible, and the proposed method outperforms the existing techniques in all experimental cases. …”
  15. 175
  16. 176

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We evaluate the system performance in terms of secrecy capacity (SC) and outage probability (OP) for two network scenarios, namely non-cooperative (NCPS) and cooperative power saving (CPS) models. The NCPS case assumes fixed power at both source and relay while the CPS case assumes total average power shared between the source and relay. …”
  17. 177

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
    Get full text
    Get full text
    Get full text
    article
  18. 178

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …”
  19. 179

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…To categorize electronic text in these two cases, deep learning models such as convolutional neural networks and recurrent neural networks and a combination of CNN-RNN were trained on this data. …”
    Get full text
  20. 180

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…Our computational experiments demonstrate, for instance, sharpness of established inequalities. In the case of model problems with known analytic solutions, very high precision of computation is observed.…”
    Get full text
    Get full text
    Get full text
    article