-
3281
Theory and Realization of Secondary Task Assignment for Multi-UAV Pickup Based on Green Scheduling
Published 2021-01-01“…The development of artificial intelligence technology has brought changes to various industries. …”
Get full text
Article -
3282
Fake news and the political economy of the media: A perspective of Ghanaian journalists
Published 2023-12-01“…This paper also identified the use of artificial intelligence and robotics in the creation of fake news content. …”
Get full text
Article -
3283
Understanding designers’ switching intention to AI painting tools using the PPM framework
Published 2025-01-01“…Abstract In recent years, the emergence of artificial intelligence painting tools has significantly changed the creative activities and future development of designers, but studies specifically addressing designers’ inclinations to transition to AI painting tools are scarce. …”
Get full text
Article -
3284
E-Commerce across Boarder Logistics Risk Evaluation Model Based on Improved Neural Network
Published 2022-01-01“…BP neural network is a typical algorithm in artificial intelligence network. It has strong nonlinear mapping ability and is the most prominent part to solve some nonlinear problems. …”
Get full text
Article -
3285
Survei Penelitian Metode Kecerdasan Buatan untuk Mendeteksi Ancaman Teknologi Serangan Siber
Published 2023-12-01“…This research aims to map the techniques and methods of artificial intelligence to detect cyber-attack technology threats in the form of a Systematic Literature Review (SLR). …”
Get full text
Article -
3286
-
3287
Perbandingan Metode Supervised Machine Learning untuk Prediksi Prevalensi Stunting di Provinsi Jawa Timur
Published 2022-12-01“…Supervised machine learning is an approach in making artificial intelligence that uses labeled data as training data. …”
Get full text
Article -
3288
LoCS-Net: Localizing convolutional spiking neural network for fast visual place recognition
Published 2025-01-01Get full text
Article -
3289
Crime mapping features
Published 2020-12-01“…Some software solutions for the implementation of the tasks of mapping criminal manifestations and the use of artificial intelligence systems for this purpose are described. …”
Get full text
Article -
3290
-
3291
Structured Dynamics in the Algorithmic Agent
Published 2025-01-01“…Our findings bridge perspectives from algorithmic information theory (Kolmogorov complexity, compressive modeling), symmetry (group theory), and dynamics (conservation laws, reduced manifolds), offering insights into the neural correlates of agenthood and structured experience in natural systems, as well as the design of artificial intelligence and computational models of the brain.…”
Get full text
Article -
3292
-
3293
Micro-Grid Wind Energy Conversion Systems: Conventional and Modern Embedded Technologies - A Review
Published 2024-12-01“…Nonetheless, there are a few drawbacks and difficulties with the two widely utilized contemporary techniques for power quality extractions: artificially intelligent neural networks and their embedded control systems. …”
Get full text
Article -
3294
Impact of AI and big data analytics on healthcare outcomes: An empirical study in Jordanian healthcare institutions
Published 2025-01-01“…Artificial intelligence (AI) and big data analytics are transforming healthcare globally and in Jordan. …”
Get full text
Article -
3295
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
Get full text
Article -
3296
Enabling Fast AI-Driven Inverse Design of a Multifunctional Nanosurface by Parallel Evolution Strategies
Published 2024-12-01“…In recent works, the authors proposed to leverage the evolution strategies (ES) to modify nanosurface characteristics with CFL to achieve specific functionalities such as frictional, optical, and bactericidal properties. For artificial intelligence (AI)-driven inverse design, earlier research integrates basic multiphysics principles such as dynamic viscosity, air diffusivity, surface tension, and electric potential with backward deep learning (DL) on the framework of ES. …”
Get full text
Article -
3297
GaitRec-Net: A Deep Neural Network for Gait Disorder Detection Using Ground Reaction Force
Published 2022-01-01“…This article presents an artificial intelligence-based comprehensive investigation of ground reaction force (GRF) pattern to classify the healthy control and gait disorders using the large-scale ground reaction force. …”
Get full text
Article -
3298
Discriminative training of spiking neural networks organised in columns for stream‐based biometric authentication
Published 2022-09-01“…SNNs have proven advantages regarding energy consumption and they are a perfect match with some proposed neuromorphic hardware chips, which can lead to a broader adoption of user device applications of artificial intelligence technologies. One of the challenges when using SNNs is the discriminative training of the network since it is not straightforward to apply the well‐known error backpropagation (EBP), massively used in traditional artificial neural networks (ANNs). …”
Get full text
Article -
3299
Civil structural health monitoring and machine learning: a comprehensive review
Published 2024-07-01“…This synthesis of advanced artificial intelligence (AI) serves as a guide, providing new researchers with knowledge about a developing field. …”
Get full text
Article -
3300
Discovering causal models for structural, construction and defense-related engineering phenomena
Published 2025-01-01Get full text
Article