بدائل البحث:
training algorithm » learning algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
uce algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements uce » elements _ (توسيع البحث)
training algorithm » learning algorithms (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
uce algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث)
elements uce » elements _ (توسيع البحث)
-
1
-
2
-
3
DRL-Based IRS-Assisted Secure Visible Light Communications
منشور في 2022"…<p dir="ltr">In this paper, we develop a novel Physical Layer Security (PLS) technique for a Visible Light Communication (VLC) system composed of light fixtures assisted by mirror array sheets serving as Intelligent Reflecting Surfaces (IRS). …"
-
4
Large language models for code completion: A systematic literature review
منشور في 2024"…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
5
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …"
احصل على النص الكامل
احصل على النص الكامل
article -
6
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…The data was used as training and testing sets to analyze certain machine learning algorithms in terms of performance (cost / benefit analysis) and accuracy (mean error square and confusion matrix). …"
احصل على النص الكامل
-
7
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
منشور في 2019"…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …"
-
8
-
9
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…"
-
10
AI-Aided Robotic Wide-Range Water Quality Monitoring System
منشور في 2024احصل على النص الكامل
article -
11
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
12
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …"
-
13
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
منشور في 2022"…After the SOMs algorithm’s training, the topographic error (TE) value together with quantization error (QE) value (i.e., 0.0000235) plotted the most appropriate map after 750,000 iterations. …"
-
14
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
منشور في 2023"…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. DL algorithms require data labeling and high-performance computers to effectively analyze and understand surveillance data recorded from fixed or mobile cameras installed in indoor or outdoor environments. …"
-
15
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…"
احصل على النص الكامل
article -
16
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
منشور في 2007احصل على النص الكامل
doctoralThesis -
17
Multigrid solvers in reconfigurable hardware. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
18
Downlink channel estimation for IMT-DS
منشور في 2001"…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
19
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
20
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…None of the surveys have ever comprehensively studied the use of Natural Language Processing (NLP) techniques for detection of phishing except one that shed light on the use of NLP techniques for classification and training purposes, while exploring a few alternatives. …"
احصل على النص الكامل
احصل على النص الكامل