بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
learning algorithm » learning algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
-
181
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
182
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
183
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
منشور في 2021"…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
-
184
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
منشور في 2016"…The main purpose of this paper is to systematically evaluate the accuracy of one such C-arm CT based metal artifact reduction (MAR) algorithm and to demonstrate its usage in both stent and flow diverter assisted coil embolization procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
185
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
186
-
187
-
188
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
منشور في 2013"…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …"
احصل على النص الكامل
article -
189
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
190
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…The performance, in regards to accuracy and F1 score of the machine learning algorithms, was also superior to the device’s native algorithm and comparable to human annotation. …"
-
191
Logistics Optimization Using Hybrid Genetic Algorithm (HGA): A Solution to the Vehicle Routing Problem With Time Windows (VRPTW)
منشور في 2024"…Experimental findings validate that HGA-SIH consistently delivers results on par with or surpasses those obtained by several cutting-edge algorithms when evaluated based on various solution quality metrics. …"
-
192
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
منشور في 2024"…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
-
193
Pedestrian Lane Detection for Assistive Navigation of Vision-Impaired People: Survey and Experimental Evaluation
منشور في 2022"…Our study covers traditional and deep learning methods for pedestrian lane detection, general road detection, and general semantic segmentation. …"
-
194
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
منشور في 2024احصل على النص الكامل
doctoralThesis -
195
Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks
منشور في 2025"…This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …"
-
196
Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces
منشور في 2021"…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …"
-
197
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
198
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
منشور في 2025"…<p>Although many high-performing speech separation models have been proposed recently, little attention has been paid to making them lightweight. In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …"
-
199
-
200
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …"