يعرض 101 - 113 نتائج من 113 نتيجة بحث عن '(((( algorithm flow function ) OR ( algorithm its function ))) OR ( algorithms within function ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 101
  2. 102

    DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications حسب Danya A. Saifaldeen (19498705)

    منشور في 2024
    "…The system comprises four VLC access points with light fixtures, reinforced by a mirror array sheet, and a mmWave access point with antennas, supported by a reflecting unit sheet. Within the system, both sheets function as IRS. The aim is to enhance the secrecy capacity (SC) of the system by optimizing the beamforming weights at the VLC fixtures, the beamforming weights at the mmWave AP, the mirror array configurations, and the phase shift vector while meeting specific power constraints. …"
  3. 103

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks حسب Insaf Kraidia (19198012)

    منشور في 2024
    "…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …"
  4. 104

    Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques حسب Kais Abdulmawjood (17947784)

    منشور في 2025
    "…In the first stage, the WPT is used to split the PV voltage and string currents into specific sub-band frequencies, and then EMD is used to decompose the selected frequency bands into a number of intrinsic mode functions (IMFs) and a residual. The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …"
  5. 105

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB حسب Alice AbdelAleem (17753799)

    منشور في 2023
    "…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …"
  6. 106

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes حسب Radhakrishnan Vishnubalaji (3563306)

    منشور في 2023
    "…., immune cells and stromal cells) within the tumor microenvironment. In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …"
  7. 107

    A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance حسب Krishnamoorthy Natarajan (22047464)

    منشور في 2024
    "…This is done through diagnosing and treating illness or injury as soon as feasible to stop or delay its course, supporting personal ways to avoid recurrence or reinjury, and implementing programs to restore individuals to their previous health and function to prevent long-term difficulties. …"
  8. 108

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks حسب Mohamed Amjath (17542512)

    منشور في 2022
    "…<p>Material handling systems (MHS) are integral to logistics functions by providing various supports such as handling, moving, and storing materials in manufacturing and service organisations. …"
  9. 109

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems حسب Hisham A. Kholidy (18891802)

    منشور في 2019
    "…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …"
  10. 110

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …"
    احصل على النص الكامل
    احصل على النص الكامل
  11. 111

    Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining حسب Mohammadjafar Hadad (21142499)

    منشور في 2024
    "…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …"
  12. 112

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review حسب Yazeed Yasin Ghadi (16667109)

    منشور في 2024
    "…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …"
  13. 113

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants حسب Mohannad N. Khandakji (13885434)

    منشور في 2022
    "…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …"