Zobrazeno 1 - 10
of 22 759
pro vyhledávání: '"Examples"'
Autor:
Kane, Robert, author
Publikováno v:
The Complex Tapestry of Free Will : A Philosophical Odyssey, 2024.
Externí odkaz:
https://doi.org/10.1093/oso/9780197751404.003.0004
Publikováno v:
Jisuanji kexue yu tansuo, Vol 18, Iss 12, Pp 3080-3099 (2024)
In recent years, there have been numerous breakthroughs in deep learning, leading to the expansion of applications based on deep learning into a wide range of fields. However, due to the vulnerability of deep neural networks, they are highly suscepti
Externí odkaz:
https://doaj.org/article/d1dcdd12759d472880efccf6647c9158
Autor:
Chengxin Zhang, Bochen Jia
Publikováno v:
Discover Education, Vol 3, Iss 1, Pp 1-22 (2024)
Abstract Background In the contemporary recent education landscape, an inventive paradigm known as ‘‘STEAM’’ has emerged, which augments the erstwhile STEM framework by incorporating the dimension of ‘‘Art’’. STEAM endeavors to enhanc
Externí odkaz:
https://doaj.org/article/629a37e4d0e140188ed857794f2e6f1b
Publikováno v:
Complex & Intelligent Systems, Vol 11, Iss 1, Pp 1-13 (2024)
Abstract Robust deep learning models have demonstrated significant applicability in real-world scenarios. The utilization of adversarial attacks plays a crucial role in assessing the robustness of these models. Among such attacks, transfer-based atta
Externí odkaz:
https://doaj.org/article/099cce3723d1447ca8dc35ff9df426bf
Autor:
Adrian LESENCIUC
Publikováno v:
Revista Română de Informatică și Automatică, Vol 34, Iss 3, Pp 9-22 (2024)
Artificial Intelligence, the AI 2.0 version (Pan, 2016), implies continuous adaptation to the information environment. The development of AI is generated by research and development requirements and by the need for an optimal response to the changing
Externí odkaz:
https://doaj.org/article/60c02d91050a45f7aaae2121baab8336
Publikováno v:
International Journal of Applied Mathematics and Computer Science, Vol 34, Iss 3, Pp 425-438 (2024)
Recent studies show that deep neural networks (DNNs) are extremely vulnerable to elaborately designed adversarial examples. Adversarial training, which uses adversarial examples as training data, has been proven to be one of the most effective method
Externí odkaz:
https://doaj.org/article/5b68925ffde547e4b9fa9e9f4cc278f2
Publikováno v:
Data in Brief, Vol 57, Iss , Pp 111043- (2024)
Machine learning is central to mainstream technology and outperforms classical approaches to handcrafted feature design. Aside from its learning process for artificial feature extraction, it has an end-to-end paradigm from input to output, reaching o
Externí odkaz:
https://doaj.org/article/290c6acf0df04d39a3ea65aa40f9fc80
Publikováno v:
Results in Engineering, Vol 24, Iss , Pp 103021- (2024)
Machine learning (ML) systems that utilize sensor inputs have become integral in various applications; however, they remain vulnerable to sensor-based adversarial example (AE) attacks, where compromised sensors can be exploited to manipulate system o
Externí odkaz:
https://doaj.org/article/7ba4e7ca015a467f941ee66f1f153367
Publikováno v:
Frontiers in Education, Vol 9 (2024)
BackgroundProofs are a key component in undergraduate mathematics, but understanding presented proofs and constructing proofs is a challenge for many students. Flipped undergraduate mathematics classrooms often employ instructional videos, yet little
Externí odkaz:
https://doaj.org/article/a1cd99ef144a41e39dafed0b9efe1edc
Autor:
Sophia M. Brink
Publikováno v:
Journal of Economic and Financial Sciences, Vol 17, Iss 1, Pp e1-e14 (2024)
Orientation: The literature does not provide illustrative examples of specific credit card rewards programme (CCRP) transactions. Research purpose: The objective of the research was to develop and confirm illustrative examples for co-brand CCRPs, co
Externí odkaz:
https://doaj.org/article/40750e318e4b4d70a5037f27c3f60bbb