العدد 20– نوفمبر تشرين الثاني 2023

| 32

(50) Kong D, Chen Y, Li NJPotIoME, Part C: Journal of Mechanical Engineering Science. Monitoring tool wear using wavelet package decomposition and a novel gravitational search algorithm–least square support vector machine model. 2020;234(3):822-36. (51) Garcia ML, Bray OH. Fundamentals of technology roadmapping. Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); 1997. (52) Chen H, Chiang RH, Storey VCJMq. Business intelligence and analytics: From big data to big impact. 2012:1165-88. (53) Provost F, Fawcett T. Data Science for Business: What you need to know about data mining and data-analytic thinking: " O’Reilly Media, Inc."; 2013. (54) Power DJhDChdh, version 4.0, March 10. A Brief History of Decision Support Systems. DSSResources. COM, World Wide Web. 2007. (55) Wang T, Li Y, Kang B, Li J, Liew J, Tang S, et al., editors. The devil is in classification: A simple framework for long-tail instance segmentation. Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XIV 16; 2020: Springer. (56) Adomavicius G, Bockstedt JC, Gupta A, Kauffman RJJMQ. Making sense of technology trends in the information technology landscape: A design science approach. 2008:779-809. (57) Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, et al. Generative adversarial nets. 2014;27. (58) Mirza M, Osindero SJapa. Conditional generative adversarial nets. 2014. (59) Korshunov P, Marcel SJapa. Deepfakes: a new threat to face recognition? assessment and detection. 2018. (60) Elgammal A, Liu B, Elhoseiny M, Mazzone MJapa. Can: Creative adversarial networks, generating" art" by learning about styles and deviating from style norms. 2017. (61) Brundage M, Avin S, Clark J, Toner H, Eckersley P, Garfinkel B, et al. The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. 2018.

Made with FlippingBook Online newsletter