يعرض 1 - 20 نتائج من 26 نتيجة بحث عن '(((( element jaya algorithm ) OR ( experiments box algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1
  2. 2

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  3. 3
  4. 4
  5. 5

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  6. 6

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach حسب Sarif, Bambang

    منشور في 2006
    "…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7
  8. 8

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter حسب Syed Rahman (569240)

    منشور في 2019
    "…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
  9. 9
  10. 10

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars حسب Abathar Al-Hamrani (16494884)

    منشور في 2023
    "…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…"
  11. 11
  12. 12
  13. 13

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
    احصل على النص الكامل
    article
  14. 14
  15. 15
  16. 16

    Downlink channel estimation for IMT-DS حسب Faisal, S.

    منشور في 2001
    "…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17
  18. 18

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model حسب Ramesh Sundar (19326046)

    منشور في 2024
    "…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …"
  19. 19

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …"
  20. 20

    Blockchain-Based Decentralized Architecture for Software Version Control حسب Muhammad Hammad (17541570)

    منشور في 2023
    "…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …"