Zobrazeno 1 - 10
of 45
pro vyhledávání: '"a A. Alwidian"'
Publikováno v:
IEEE Access, Vol 12, Pp 154310-154336 (2024)
Employing Artificial Intelligence techniques to address challenges in requirements elicitation is gaining traction. Although nine systematic literature reviews have been published on AI-based solutions in the requirements elicitation domain, to our k
Externí odkaz:
https://doaj.org/article/babfeed10d1d49d99ba79d720197c1e5
Publikováno v:
IEEE Access, Vol 12, Pp 114263-114279 (2024)
Embedded software quality is a critical concern in modern engineering, impacting a broad range of applications from spacecraft to complex control systems. Requirements engineering and software maintenance play pivotal roles in ensuring the high relia
Externí odkaz:
https://doaj.org/article/e6b36565122248cfa7b6eff0e0cb3a4f
Publikováno v:
Sensors, Vol 23, Iss 5, p 2697 (2023)
Deep learning has been successfully utilized in many applications, but it is vulnerable to adversarial samples. To address this vulnerability, a generative adversarial network (GAN) has been used to train a robust classifier. This paper presents a no
Externí odkaz:
https://doaj.org/article/cdc523d5ddc84a1897a9d2ea6f955572
Publikováno v:
Algorithms, Vol 16, Iss 2, p 105 (2023)
A model family is a set of related models in a given language, with commonalities and variabilities that result from evolution of models over time and/or variation over intended usage (the spatial dimension). As the family size increases, it becomes
Externí odkaz:
https://doaj.org/article/36df16e7c430425b8c955266781c1d3e
Autor:
Zhao, Weimin1 (AUTHOR) weimin.zhao@ontariotechu.net, Mahmoud, Qusay H.1 (AUTHOR), Alwidian, Sanaa1 (AUTHOR)
Publikováno v:
Sensors (14248220). Mar2023, Vol. 23 Issue 5, p2697. 24p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Algorithms, Vol 15, Iss 8, p 283 (2022)
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the
Externí odkaz:
https://doaj.org/article/64811f9fbf3c46e98d480c276b76380f
Autor:
Zhao, Weimin1 (AUTHOR) weimin.zhao@ontariotechu.net, Alwidian, Sanaa1 (AUTHOR), Mahmoud, Qusay H.1 (AUTHOR)
Publikováno v:
Algorithms. Aug2022, Vol. 15 Issue 8, pN.PAG-N.PAG. 27p.
Autor:
Sanaa Alwidian, Jason Jaskolka
Publikováno v:
Requirements Engineering: Foundation for Software Quality ISBN: 9783031297854
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::36d9f757ed35fb8f6a45bdbb41712066
https://doi.org/10.1007/978-3-031-29786-1_5
https://doi.org/10.1007/978-3-031-29786-1_5