بدائل البحث:
learning algorithm » learning algorithms (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
يعرض 181 - 200 نتائج من 363 نتيجة بحث عن '(((( based making algorithm ) OR ( deep learning algorithm ))) OR ( elements method algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 181
  2. 182

    Single channel speech denoising by DDPG reinforcement learning agent حسب Sania Gul (18272227)

    منشور في 2025
    "…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
  3. 183

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review حسب Zainab Jan (17306614)

    منشور في 2021
    "…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
  4. 184

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization حسب Chintalapani, Gouthami

    منشور في 2016
    "…The main purpose of this paper is to systematically evaluate the accuracy of one such C-arm CT based metal artifact reduction (MAR) algorithm and to demonstrate its usage in both stent and flow diverter assisted coil embolization procedures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 185
  6. 186
  7. 187
  8. 188

    A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I حسب Khasawneh, Mohammad

    منشور في 2013
    "…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …"
    احصل على النص الكامل
    article
  9. 189

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) حسب Gutub, Adnan

    منشور في 2002
    "…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 190

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques حسب Joao Palotti (8479842)

    منشور في 2019
    "…The performance, in regards to accuracy and F1 score of the machine learning algorithms, was also superior to the device’s native algorithm and comparable to human annotation. …"
  11. 191

    Logistics Optimization Using Hybrid Genetic Algorithm (HGA): A Solution to the Vehicle Routing Problem With Time Windows (VRPTW) حسب Ayesha Maroof (17984053)

    منشور في 2024
    "…Experimental findings validate that HGA-SIH consistently delivers results on par with or surpasses those obtained by several cutting-edge algorithms when evaluated based on various solution quality metrics. …"
  12. 192

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network حسب Mohammad Reza Chalak Qazani (13893261)

    منشور في 2024
    "…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
  13. 193

    Pedestrian Lane Detection for Assistive Navigation of Vision-Impaired People: Survey and Experimental Evaluation حسب Yunjia Lei (19517725)

    منشور في 2022
    "…Our study covers traditional and deep learning methods for pedestrian lane detection, general road detection, and general semantic segmentation. …"
  14. 194
  15. 195

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …"
  16. 196

    Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces حسب Uzair Sajjad (19646296)

    منشور في 2021
    "…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …"
  17. 197

    Bird’s Eye View feature selection for high-dimensional data حسب Samir Brahim Belhaouari (16855434)

    منشور في 2023
    "…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
  18. 198

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization حسب Muhammad Salman Khan (7202543)

    منشور في 2025
    "…<p>Although many high-performing speech separation models have been proposed recently, little attention has been paid to making them lightweight. In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …"
  19. 199
  20. 200

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …"