Academic literature on the topic 'Algorithme MIIC'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorithme MIIC.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Algorithme MIIC"

1

Weyerer, Veronika, Pamela L. Strissel, Reiner Strick, et al. "Integration of Spatial PD-L1 Expression with the Tumor Immune Microenvironment Outperforms Standard PD-L1 Scoring in Outcome Prediction of Urothelial Cancer Patients." Cancers 13, no. 10 (2021): 2327. http://dx.doi.org/10.3390/cancers13102327.

Full text
Abstract:
Background: Immune therapy has gained significant importance in managing urothelial cancer. The value of PD-L1 remains a matter of controversy, thus requiring an in-depth analysis of its biological and clinical relevance. Methods: A total of 193 tumors of muscle-invasive bladder cancer patients (MIBC) were assessed with four PD-L1 assays. PD-L1 scoring results were correlated with data from a comprehensive digital-spatial immune-profiling panel using descriptive statistics, hierarchical clustering and uni-/multivariable survival analyses. Results: PD-L1 scoring algorithms are heterogeneous (ag
APA, Harvard, Vancouver, ISO, and other styles
2

Pourkashani, Ava, Asadollah Shahbahrami, and Alireza Akoushideh. "Copy-move forgery detection using convolutional neural network and K-mean clustering." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (2021): 2604. http://dx.doi.org/10.11591/ijece.v11i3.pp2604-2612.

Full text
Abstract:
Copying and pasting a patch of an image to hide or exaggerate something in a digital image is known as a copy-move forgery. Copy-move forgery detection (CMFD) is hard to detect because the copied part image from a scene has similar properties with the other parts of the image in terms of texture, light illumination, and objective. The CMFD is still a challenging issue in some attacks such as rotation, scaling, blurring, and noise. In this paper, an approach using the convolutional neural network (CNN) and k-mean clustering is for CMFD. To identify cloned parts candidates, a patch of an image i
APA, Harvard, Vancouver, ISO, and other styles
3

Tinnathi, Sreenivasu, and G. Sudhavani. "Copy-Move Forgery Detection Using Superpixel Clustering Algorithm and Enhanced GWO Based AlexNet Model." Cybernetics and Information Technologies 22, no. 4 (2022): 91–110. http://dx.doi.org/10.2478/cait-2022-0041.

Full text
Abstract:
Abstract In this work a model is introduced to improve forgery detection on the basis of superpixel clustering algorithm and enhanced Grey Wolf Optimizer (GWO) based AlexNet. After collecting the images from MICC-F600, MICC-F2000 and GRIP datasets, patch segmentation is accomplished using a superpixel clustering algorithm. Then, feature extraction is performed on the segmented images to extract deep learning features using an enhanced GWO based AlexNet model for better forgery detection. In the enhanced GWO technique, multi-objective functions are used for selecting the optimal hyper-parameter
APA, Harvard, Vancouver, ISO, and other styles
4

Rajamani, Sripriya, Aaron Bieringer, Stephanie Wallerius, Daniel Jensen, Tamara Winden, and Miriam Halstead Muscoplat. "Direct and Electronic Health Record Access to the Clinical Decision Support for Immunizations in the Minnesota Immunization Information System." Biomedical Informatics Insights 8s2 (January 2016): BII.S40208. http://dx.doi.org/10.4137/bii.s40208.

Full text
Abstract:
Immunization information systems (IIS) are population-based and confidential computerized systems maintained by public health agencies containing individual data on immunizations from participating health care providers. IIS hold comprehensive vaccination histories given across providers and over time. An important aspect to IIS is the clinical decision support for immunizations (CDSi), consisting of vaccine forecasting algorithms to determine needed immunizations. The study objective was to analyze the CDSi presentation by IIS in Minnesota (Minnesota Immunization Information Connection [MIIC]
APA, Harvard, Vancouver, ISO, and other styles
5

Zheng, Qingyuan, Zhengyu Jiang, Xinmiao Ni, et al. "Machine Learning Quantified Tumor-Stroma Ratio Is an Independent Prognosticator in Muscle-Invasive Bladder Cancer." International Journal of Molecular Sciences 24, no. 3 (2023): 2746. http://dx.doi.org/10.3390/ijms24032746.

Full text
Abstract:
Although the tumor-stroma ratio (TSR) has prognostic value in many cancers, the traditional semi-quantitative visual assessment method has inter-observer variability, making it impossible for clinical practice. We aimed to develop a machine learning (ML) algorithm for accurately quantifying TSR in hematoxylin-and-eosin (H&E)-stained whole slide images (WSI) and further investigate its prognostic effect in patients with muscle-invasive bladder cancer (MIBC). We used an optimal cell classifier previously built based on QuPath open-source software and ML algorithm for quantitative calculation
APA, Harvard, Vancouver, ISO, and other styles
6

Ye, Qing, Ruochen Wang, Chi Zhang, and Yingfeng Cai. "Research on Intelligent Vehicle Path Tracking with Subsystems Based on Multimodel Intelligent Hierarchical Control Theory." Mathematical Problems in Engineering 2021 (June 9, 2021): 1–15. http://dx.doi.org/10.1155/2021/7448517.

Full text
Abstract:
In this paper, a multimodel intelligent hierarchical control (MIHC) algorithm with dual systems is proposed to reduce the performance conflict between a path-tracking motion system and its subsystems during the motion control process of an intelligent vehicle (IV). The working principle of the MIHC algorithm is briefly introduced first, and the dynamic models of IV and the subsystems are constructed. Then, correlation controller models based on MIHC are established. Lastly, the influence of the subsystems on the trajectory tracking of IV is validated through simulations and hardware-in-the-loo
APA, Harvard, Vancouver, ISO, and other styles
7

Jue Fu, Ying Zhang,. "Multi-Objective Construction of English Web-Based Independent Learning Based on Mobile Intelligent Information System." Journal of Electrical Systems 20, no. 3s (2024): 574–86. http://dx.doi.org/10.52783/jes.1332.

Full text
Abstract:
A Mobile Intelligent Information System (MIIS) represents a transformative tool in the digital age, empowering users with access to dynamic and personalized information anytime, anywhere. Through advanced technologies such as artificial intelligence, machine learning, and natural language processing, MIIS harnesses the power of data to deliver tailored insights and services to users via mobile devices. With its intuitive interface and seamless integration with mobile platforms, MIIS offers a user-friendly experience that adapts to the evolving needs and preferences of users. As mobile technolo
APA, Harvard, Vancouver, ISO, and other styles
8

Elaskily, Mohamed A., Monagi H. Alkinani, Ahmed Sedik, and Mohamed M. Dessouky. "Deep learning based algorithm (ConvLSTM) for Copy Move Forgery Detection." Journal of Intelligent & Fuzzy Systems 40, no. 3 (2021): 4385–405. http://dx.doi.org/10.3233/jifs-201192.

Full text
Abstract:
Protecting information from manipulation is important challenge in current days. Digital images are one of the most popular information representation. Images could be used in several fields such as military, social media, security purposes, intelligence fields, evidences in courts, and newspapers. Digital image forgeries mean adding unusual patterns to the original images that cause a heterogeneity manner in form of image properties. Copy move forgery is one of the hardest types of image forgeries to be detected. It is happened by duplicating part or section of the image then adding again in
APA, Harvard, Vancouver, ISO, and other styles
9

Amiri, Ehsan, Ahmad Mosallanejad, and Amir Sheikhahmadi. "Copy-Move Forgery Detection Using an Equilibrium Optimization Algorithm (CMFDEOA)." Statistics, Optimization & Information Computing 11, no. 3 (2023): 677–84. http://dx.doi.org/10.19139/soic-2310-5070-1511.

Full text
Abstract:
Image forgery detection is a new challenge. One type of image forgery is a copy-move forgery. In this method, part of the image is copied and placed at the most similar point. Given the existing algorithms and processing software, identifying forgery areas is difficult and has created challenges in various applications. The proposed method based on the Equilibrium Optimization Algorithm (EOA) helps image forgery detection by finding forgery areas. The proposed method includes feature detection, image segmentation, and detection of forgery areas using the EOA algorithm. In the first step, the i
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Qianmu, Shunmei Meng, Xiaonan Sang, et al. "Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing." ACM Transactions on Internet Technology 21, no. 3 (2021): 1–33. http://dx.doi.org/10.1145/3408291.

Full text
Abstract:
Volunteer computing uses computers volunteered by the general public to do distributed scientific computing. Volunteer computing is being used in high-energy physics, molecular biology, medicine, astrophysics, climate study, and other areas. These projects have attained unprecedented computing power. However, with the development of information technology, the traditional defense system cannot deal with the unknown security problems of volunteer computing . At the same time, Cyber Mimic Defense (CMD) can defend the unknown attack behavior through its three characteristics: dynamic, heterogeneo
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Algorithme MIIC"

1

Li, Honghao. "Interpretable biological network reconstruction from observational data." Electronic Thesis or Diss., Université Paris Cité, 2021. http://www.theses.fr/2021UNIP5207.

Full text
Abstract:
Cette thèse porte sur les méthodes basées sur des contraintes. Nous présentons comme exemple l’algorithme PC, pour lequel nous proposons une modification qui garantit la cohérence des ensembles de séparation, utilisés pendant l’étape de reconstruction du squelette pour supprimer les arêtes entre les variables conditionnellement indépendantes, par rapport au graphe final. Elle consiste à itérer l’algorithme d’apprentissage de structure tout en limitant la recherche des ensembles de séparation à ceux qui sont cohérents par rapport au graphe obtenu à la fin de l’itération précédente. La contraint
APA, Harvard, Vancouver, ISO, and other styles
2

Vojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.

Full text
Abstract:
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Ye, Fan. "Nouveaux algorithmes numériques pour l’utilisation efficace des architectures multi-cœurs et hétérogènes." Thesis, Lille 1, 2015. http://www.theses.fr/2015LIL10169/document.

Full text
Abstract:
Cette étude est motivée par les besoins réels de calcul dans la physique des réacteurs. Notre objectif est de concevoir les algorithmes parallèles, y compris en proposant efficaces noyaux algébriques linéaires et méthodes numériques parallèles.Dans un environnement many-cœurs en mémoire partagée tel que le système Intel Many Integrated Core (MIC), la parallélisation efficace d'algorithmes est obtenue en termes de parallélisme des tâches à grain fin et parallélisme de données. Pour la programmation des tâches, deux principales stratégies, le partage du travail et vol de travail ont été étudiées
APA, Harvard, Vancouver, ISO, and other styles
4

Zgheib, Rawad. "Algorithmes adaptatifs d'identification et de reconstruction de processus AR à échantillons manquants." Phd thesis, Université Paris Sud - Paris XI, 2007. http://tel.archives-ouvertes.fr/tel-00273585.

Full text
Abstract:
On souhaite reconstruire en ligne des signaux à échantillons manquants en utilisant une approche paramétrique. On propose alors des algorithmes adaptatifs d'identification et de reconstruction de processus AR à échantillons manquants. On s'intéresse premièrement à l'extension des algorithmes de gradient au cas des signaux à échantillons manquants. On propose alors deux alternatives à un algorithme existant fondées sur deux autres prédicteurs. Les algorithmes proposés convergent vers une estimation non biaisée des paramètres. Or les algorithmes de gradient souffrent d'une faible vitesse de conv
APA, Harvard, Vancouver, ISO, and other styles
5

Ermolenko, Evgenii. "Algorithm-aided Information Design: Hybrid Design approach on the edge of associative methodologies in AEC." Master's thesis, 2020. http://hdl.handle.net/1822/74793.

Full text
Abstract:
Dissertação de mestrado em European Master in Building Information Modelling<br>Last three decades have brought colossal progress to design methodologies within the common pursuit toward a seamless fusion between digital and physical worlds and augmenting it with the of computation power and network coverage. For this historically short period, two generations of methodologies and tools have emerged: Additive generation and parametric Associative generation of CAD. Currently, designers worldwide engaged in new forms of design exploration. From this race, two prominent methodologies have develo
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Algorithme MIIC"

1

Coolen, A. C. C., A. Annibale, and E. S. Roberts. Network growth algorithms. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198709893.003.0008.

Full text
Abstract:
Growth processes are a fundamentally different approach compared to probability-driven exponential models covered in earlier chapters. This chapter studies how growth rules can be designed to mimic processes observed in the real world, and how the process can be mathematically analyzed in order to obtain information about the likely topological properties of the resulting networks. The configuration (stub joining) model is described, including a careful discussion of how bias can be introduced if backtracking is used instead of restarting if stubs join to form a self or double link. The second
APA, Harvard, Vancouver, ISO, and other styles
2

Kolm, Petter N., and Lee Maclin. Algorithmic Trading, Optimal Execution, and Dyna Mic Port Folios. Oxford University Press, 2011. http://dx.doi.org/10.1093/oxfordhb/9780199553433.013.0017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amine, Abdelmalek, Salim Chikhi, Allaoua Chaoui, Mohamed Khireddine Kholladi, and Djamel Eddine Saidouni. Modelling and Implementation of Complex Systems: Proceedings of the 6th International Symposium, MISC 2020, Batna, Algeria, October 24‐26, 2020. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Amine, Abdelmalek, Salim Chikhi, Allaoua Chaoui, and Djamel Eddine Saidouni. Modelling and Implementation of Complex Systems: Proceedings of the 5th International Symposium, MISC 2018, December 16-18, 2018, Laghouat, Algeria. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Amine, Abdelmalek, Salim Chikhi, Allaoua Chaoui, Mohamed Khireddine Kholladi, and Djamel Eddine Saidouni. Modelling and Implementation of Complex Systems: Proceedings of the 4th International Symposium, MISC 2016, Constantine, Algeria, May 7-8, 2016, ... Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Diaz-Descalzo, Gregorio, Abdelmalek Amine, Salim Chikhi, Allaoua Chaoui, and Djamel Eddine Saidouni. Modelling and Implementation of Complex Systems: Proceedings of the 7th International Symposium, MISC 2022, Mostaganem, Algeria, October 30‐31 2022. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amine, Abdelmalek, Salim Chikhi, Allaoua Chaoui, Mohamed Khireddine Kholladi, and Djamel Eddine Saidouni. Modelling and Implementation of Complex Systems: Proceedings of the 4th International Symposium, MISC 2016, Constantine, Algeria, May 7-8, 2016, Constantine, Algeria. Springer London, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goleman, Travis. Machine Learning and Artificial Intelligence 2 Manuscripts In 1: The Essential Guide to Understand Artificial Intelligence, Machine Learning, Mimic Human Behavior, NLP Algorithms and Deep Learning. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goleman, Travis. Artificial Intelligence for Beginners: All You Have to Know about the Potential of AI in the Future, Techniques to Mimic Human Behavior, Deep Learning and NLP Algorithms. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shroff, Gautam. The Intelligent Web. Oxford University Press, 2013. http://dx.doi.org/10.1093/oso/9780199646715.001.0001.

Full text
Abstract:
As we use the Web for social networking, shopping, and news, we leave a personal trail. These days, linger over a Web page selling lamps, and they will turn up at the advertising margins as you move around the Internet, reminding you, tempting you to make that purchase. Search engines such as Google can now look deep into the data on the Web to pull out instances of the words you are looking for. And there are pages that collect and assess information to give you a snapshot of changing political opinion. These are just basic examples of the growth of "Web intelligence", as increasingly sophist
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Algorithme MIIC"

1

Liu, Yang, and Liang Deng. "Acceleration of CFD Engineering Software on GPU and MIC." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27161-3_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ju, Tao, Zhengdong Zhu, Yinfeng Wang, Liang Li, and Xiaoshe Dong. "Thread Mapping and Parallel Optimization for MIC Heterogeneous Parallel Systems." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11194-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Kun, and Yifeng Chen. "Improving Performance of Floating Point Division on GPU and MIC." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27122-4_48.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Liang, Weihao, Hong An, Feng Li, and Yichao Cheng. "Optimization of Binomial Option Pricing on Intel MIC Heterogeneous System." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27137-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Cheng, Yunfei Du, Zhen Xu, and Canqun Yang. "FT-Offload: A Scalable Fault-Tolerance Programing Model on MIC Cluster." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27140-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szustak, Lukasz, Kamil Halbiniak, Adam Kulawik, Roman Wyrzykowski, Piotr Uminski, and Marcin Sasinowski. "Using hStreams Programming Library for Accelerating a Real-Life Application on Intel MIC." In Algorithms and Architectures for Parallel Processing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49956-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Ruping, Hui Li, Mei Chen, Zhenyu Dai, and Ming Zhu. "MIC-KMeans: A Maximum Information Coefficient Based High-Dimensional Clustering Algorithm." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91189-2_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lirkov, Ivan, Yavor Vutov, Marcin Paprzycki, and Maria Ganzha. "Parallel Performance Evaluation of MIC(0) Preconditioning Algorithm for Voxel μFE Simulation." In Parallel Processing and Applied Mathematics. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14403-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Wei, Shaoxiong Ji, Erik Cambria, and Pekka Marttinen. "Multitask Recalibrated Aggregation Network for Medical Code Prediction." In Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-86514-6_23.

Full text
Abstract:
AbstractMedical coding translates professionally written medical reports into standardized codes, which is an essential part of medical information systems and health insurance reimbursement. Manual coding by trained human coders is time-consuming and error-prone. Thus, automated coding algorithms have been developed, building especially on the recent advances in machine learning and deep neural networks. To solve the challenges of encoding lengthy and noisy clinical documents and capturing code associations, we propose a multitask recalibrated aggregation network. In particular, multitask learning shares information across different coding schemes and captures the dependencies between different medical codes. Feature recalibration and aggregation in shared modules enhance representation learning for lengthy notes. Experiments with a real-world MIMIC-III dataset show significantly improved predictive performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Arslantas, Mustafa Kemal, Tunc Asuroglu, Reyhan Arslantas, et al. "Using Machine Learning Methods to Predict the Lactate Trend of Sepsis Patients in the ICU." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-59091-7_1.

Full text
Abstract:
AbstractSerum lactate levels are considered a biomarker of tissue hypoxia. In sepsis or septic shock patients, as suggested by The Surviving Sepsis Campaign, early lactate clearance-directed therapy is associated with decreased mortality; thus, serum lactate levels should be assessed. Monitoring a patient’s vital parameters and repetitive blood analysis may have deleterious effects on the patient and also bring an economic burden. Machine learning and trend analysis are gaining importance to overcome these issues. In this context, we aimed to investigate if a machine learning approach can predict lactate trends from non-invasive parameters of patients with sepsis. This retrospective study analyzed adult sepsis patients in the Medical Information Mart for Intensive Care IV (MIMIC-IV) dataset. Inclusion criteria were two or more lactate tests within 6 h of diagnosis, an ICU stay of at least 24 h, and a change of ≥1 mmol/liter in lactate level. Naïve Bayes, J48 Decision Tree, Logistic Regression, Random Forest, and Logistic Model Tree (LMT) classifiers were evaluated for lactate trend prediction. LMT algorithm outperformed other classifiers (AUC = 0.803; AUPRC = 0.921). J48 decision tree performed worse than the other methods when predicting constant trend. LMT algorithm with four features (heart rate, oxygen saturation, initial lactate, and time interval variables) achieved 0.80 in terms of AUC (AUPRC = 0.921). We can say that machine learning models that employ logistic regression architectures, i.e., LMT algorithm achieved good results in lactate trend prediction tasks, and it can be effectively used to assess the state of the patient, whether it is stable or improving.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Algorithme MIIC"

1

Lu, Dau-Tsuong, Ramamohan Paturi, Sadik Esener, and Sing H. Lee. "Parallel algorithms with irregular interconnections and optical technology." In OSA Annual Meeting. Optica Publishing Group, 1989. http://dx.doi.org/10.1364/oam.1989.mii3.

Full text
Abstract:
We consider the implementation of fast parallel algorithms. We make the case that irregular interconnections result in faster parallel algorithms; consequently, optical technologies that can support such randomlike interconnections are preferable. We demonstrate this by selecting a problem which has very fast parallel algorithms when irregular interconnections are used, and by suggesting certain optical technologies that can support such irregular interconnections for implementing these fast parallel algorithms. (On the other hand, it is well known that any technology that can only support reg
APA, Harvard, Vancouver, ISO, and other styles
2

Ko, Ching Yun, Rui Lin, Shu Li, and Ngai Wong. "MiSC: Mixed Strategies Crowdsourcing." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/193.

Full text
Abstract:
Popular crowdsourcing techniques mostly focus on evaluating workers' labeling quality before adjusting their weights during label aggregation. Recently, another cohort of models regard crowdsourced annotations as incomplete tensors and recover unfilled labels by tensor completion. However, mixed strategies of the two methodologies have never been comprehensively investigated, leaving them as rather independent approaches. In this work, we propose MiSC ( Mixed Strategies Crowdsourcing), a versatile framework integrating arbitrary conventional crowdsourcing and tensor completion techniques. In p
APA, Harvard, Vancouver, ISO, and other styles
3

Kumar, Shivesh, Marc Simnofske, Bertold Bongardt, Andreas Müller, and Frank Kirchner. "Integrating Mimic Joints into Dynamics Algorithms." In the Advances in Robotics. ACM Press, 2017. http://dx.doi.org/10.1145/3132446.3134891.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Navaz, K., S. Yazhinian, N. Muthuvairavan Pillai, Neelamegam Devarasu, and M. Sankar. "MXDD Scheduling Algorithm for MIBC Switches." In 2023 International Conference on System, Computation, Automation and Networking (ICSCAN). IEEE, 2023. http://dx.doi.org/10.1109/icscan58655.2023.10395457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tuncel, Mehmet, Ahmet Duran, M. Serdar Celebi, Bora Akaydin, and Figen O. Topkaya. "A comparison of SuperLU solvers on the intel MIC architecture." In NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS (NUMTA–2016): Proceedings of the 2nd International Conference “Numerical Computations: Theory and Algorithms”. Author(s), 2016. http://dx.doi.org/10.1063/1.4965394.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ju, Tao, Xiaoshe Dong, Endong Wang, Liang Li, and Zhengdong Zhu. "Parallel Optimization Strategies for MIC Heterogeneous Parallel Systems." In 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). IEEE, 2014. http://dx.doi.org/10.1109/paap.2014.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Neupane, Aadesh, and Michael Goodrich. "Learning Swarm Behaviors using Grammatical Evolution and Behavior Trees." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/73.

Full text
Abstract:
Algorithms used in networking, operation research and optimization can be created using bio-inspired swarm behaviors, but it is difficult to mimic swarm behaviors that generalize through diverse environments. State-machine-based artificial collective behaviors evolved by standard Grammatical Evolution (GE) provide promise for general swarm behaviors but may not scale to large problems. This paper introduces an algorithm that evolves problem-specific swarm behaviors by combining multi-agent grammatical evolution and Behavior Trees (BTs). We present a BT-based BNF grammar, supported by different
APA, Harvard, Vancouver, ISO, and other styles
8

Junling Li, Bohu Liang, and Xiaodong Su. "Research on ECG signal filtering algorithm based on the fusion of multiple algorithms." In 2012 International Conference on Measurement, Information and Control (MIC). IEEE, 2012. http://dx.doi.org/10.1109/mic.2012.6273273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Changfei, Zhou, Lu Kai, Chi Wanqing, Wang Xiaoping, and Xiong Zhenhai. "MIC Acceleration of Saliency Detection Algorithm." In 1st International Workshop on Cloud Computing and Information Security. Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Zhaoqi, and Jin Wei. "Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems." In 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET). IEEE, 2019. http://dx.doi.org/10.1109/ccet48361.2019.8989231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!