Showing 1 - 20 results of 36 for search '(( complement based algorithm ) OR ((( second layer algorithm ) OR ( neural coding algorithm ))))', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Deep Learning-Based Coding Strategy for Improved Cochlear Implant Speech Perception in Noisy Environments by Billel Essaid (22047578)

    Published 2025
    “…The second strategy builds on this framework by additionally incorporating bidirectional gated recurrent units (Bi-GRU) alongside TCN and MHA layers, further refining sequence modeling and enhancing noise reduction. …”
  6. 6
  7. 7
  8. 8

    A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text by M. Ghoniem , Rania

    Published 2019
    “…Then, feature mapping is performed by assigning the concepts’ similarities to the concept features. Second, a hybrid genetic-whale optimization algorithm was proposed to optimize ontology learning from Arabic text. …”
    Get full text
    Get full text
  9. 9

    Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing by Abualigah, Laith

    Published 2024
    “…The Jaya algorithm's ability to exploit the current best solutions is complemented by the SSO's collaborative search strategy, resulting in a synergistic optimization framework. …”
    Get full text
  10. 10

    YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm by Prabu Selvam (22330264)

    Published 2025
    “…Finally, an Additional Feature Fusion Layer (AFFL) is introduced in the neck to enhance the performance of the small defect identification. …”
  11. 11
  12. 12
  13. 13
  14. 14

    MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments by Hend Gedawy (23275984)

    Published 2022
    “…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …”
  15. 15
  16. 16
  17. 17
  18. 18

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…Building on this foundation, the second algorithm extends this analytical approach to support high-dimensional input data, substantially enhancing its utility across complex real-world datasets. …”
  19. 19

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 2020
    “…The algorithm is modelled in a hardware description language and its VLSI chip implemented. …”
    Get full text
    article
  20. 20

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …”
    Get full text
    Get full text
    article