Showing 21 - 40 results of 53 for search '(((( path modeling algorithm ) OR ( elements custom algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 21

    Advanced Quantum Control with Ensemble Reinforcement Learning: A Case Study on the XY Spin Chain by Farshad Rahimi Ghashghaei (20880995)

    Published 2025
    “…<p dir="ltr">This research presents an ensemble Reinforcement Learning (RL) approach that combines Deep Q-Network (DQN) and Proximal Policy Optimization (PPO) algorithms to tackle quantum control problems. This research aims to use the complementary strengths of DQN and PPO algorithms to develop robust and adaptive control policies for noisy and uncertain quantum systems. …”
  2. 22

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 23

    Virtual Inertia Support in Power Systems for High Penetration of Renewables—Overview of Categorization, Comparison, and Evaluation of Control Techniques by Naruttam Kumar Roy (16904544)

    Published 2022
    “…Integrating intelligent methods, such as fuzzy logic, genetic algorithm, non-convex optimization, and heuristic optimization, signify intelligent control methods. …”
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28

    Analysis of Multi-User-Based UAV System With Outdated CSI by Parvez Shaik (21633041)

    Published 2024
    “…In addition, energy efficiency analysis is also performed for the considered system model. In this framework, altitude and location-dependent path loss modeling are considered for the air-to-ground links. …”
  9. 29

    Fracture and stability of strain-softening materials and structures by Tabbara, Mazen

    Published 1990
    “…The model is shown to realistically simulate the evolution of cracking and its localization. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 30
  11. 31
  12. 32

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  13. 33
  14. 34
  15. 35

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  16. 36
  17. 37

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
    Get full text
  18. 38

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  19. 39

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  20. 40

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”