Showing 101 - 120 results of 123 for search '(((( algorithm phase function ) OR ( algorithm its function ))) OR ( algorithms within function ))', query time: 0.15s Refine Results
  1. 101

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…In this paper, a Dual-Deep-Network technique is described for the extraction of statistical structures from a hybrid beam forming model based on mmWave logics, as well as training logic for the network map functions. The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  2. 102

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”
  3. 103

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 104
  5. 105
  6. 106

    Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network by Fares Almomani (12585685)

    Published 2020
    “…An ANN model consists of three layers, 15 neutrons and 260 <i>epochs</i> accurately predict the CMP with 99.1% of data within ±10% deviation of the mean experimental value. …”
  7. 107

    A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks by Shaik, Muzibur Rehman

    Published 2007
    “…Unpredictable dysfunction in its proper administration adds to the problems of this sophisticated network. …”
    Get full text
    masterThesis
  8. 108
  9. 109

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks by Insaf Kraidia (19198012)

    Published 2024
    “…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …”
  10. 110

    Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques by Kais Abdulmawjood (17947784)

    Published 2025
    “…In the first stage, the WPT is used to split the PV voltage and string currents into specific sub-band frequencies, and then EMD is used to decompose the selected frequency bands into a number of intrinsic mode functions (IMFs) and a residual. The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …”
  11. 111

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB by Alice AbdelAleem (17753799)

    Published 2023
    “…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
  12. 112

    Single-Cell Transcriptome Analysis Revealed Heterogeneity and Identified Novel Therapeutic Targets for Breast Cancer Subtypes by Radhakrishnan Vishnubalaji (3563306)

    Published 2023
    “…., immune cells and stromal cells) within the tumor microenvironment. In the current study, we employed computational algorithms to decipher the cellular composition of estrogen receptor-positive (ER<sup>+</sup>), HER2<sup>+</sup>, ER<sup>+</sup>HER2<sup>+</sup>, and triple-negative BC (TNBC) subtypes from a total of 49,899 single cells’ publicly available transcriptomic data derived from 26 BC patients. …”
  13. 113

    A novel method for the detection and classification of multiple diseases using transfer learning-based deep learning techniques with improved performance by Krishnamoorthy Natarajan (22047464)

    Published 2024
    “…This is done through diagnosing and treating illness or injury as soon as feasible to stop or delay its course, supporting personal ways to avoid recurrence or reinjury, and implementing programs to restore individuals to their previous health and function to prevent long-term difficulties. …”
  14. 114

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  15. 115
  16. 116

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…<p>Material handling systems (MHS) are integral to logistics functions by providing various supports such as handling, moving, and storing materials in manufacturing and service organisations. …”
  17. 117
  18. 118

    VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems by Hisham A. Kholidy (18891802)

    Published 2019
    “…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …”
  19. 119

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms by Sadhukhan, Payel

    Published 2024
    “…Privacy and security of data and models are fundamental necessities that must be satisfied for this protocol's proper functioning. To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
    Get full text
    Get full text
  20. 120

    Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining by Mohammadjafar Hadad (21142499)

    Published 2024
    “…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …”