Showing 101 - 113 results of 113 for search '(((( algorithm flow function ) OR ( algorithm its function ))) OR ( algorithms within function ))', query time: 0.09s Refine Results
  1. 101
  2. 102

    DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications by Danya A. Saifaldeen (19498705)

    Published 2024
    “…The system comprises four VLC access points with light fixtures, reinforced by a mirror array sheet, and a mmWave access point with antennas, supported by a reflecting unit sheet. Within the system, both sheets function as IRS. The aim is to enhance the secrecy capacity (SC) of the system by optimizing the beamforming weights at the VLC fixtures, the beamforming weights at the mmWave AP, the mirror array configurations, and the phase shift vector while meeting specific power constraints. …”
  3. 103

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks by Insaf Kraidia (19198012)

    Published 2024
    “…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …”
  4. 104

    Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques by Kais Abdulmawjood (17947784)

    Published 2025
    “…In the first stage, the WPT is used to split the PV voltage and string currents into specific sub-band frequencies, and then EMD is used to decompose the selected frequency bands into a number of intrinsic mode functions (IMFs) and a residual. The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …”
  5. 105

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB by Alice AbdelAleem (17753799)

    Published 2023
    “…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
  6. 106

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes by Radhakrishnan Vishnubalaji (3563306)

    Published 2023
    “…., immune cells and stromal cells) within the tumor microenvironment. In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
  7. 107

    A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance by Krishnamoorthy Natarajan (22047464)

    Published 2024
    “…This is done through diagnosing and treating illness or injury as soon as feasible to stop or delay its course, supporting personal ways to avoid recurrence or reinjury, and implementing programs to restore individuals to their previous health and function to prevent long-term difficulties. …”
  8. 108

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…<p>Material handling systems (MHS) are integral to logistics functions by providing various supports such as handling, moving, and storing materials in manufacturing and service organisations. …”
  9. 109

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …”
  10. 110

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  11. 111

    Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining by Mohammadjafar Hadad (21142499)

    Published 2024
    “…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …”
  12. 112

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”
  13. 113

    Gene-specific machine learning model to predict the pathogenicity of BRCA2 variants by Mohannad N. Khandakji (13885434)

    Published 2022
    “…<h3>Background</h3><p dir="ltr">Existing BRCA2-specific variant pathogenicity prediction algorithms focus on the prediction of the functional impact of a subtype of variants alone. …”