Showing 121 - 140 results of 173 for search '(( algorithms within function ) OR ((( algorithm from function ) OR ( algorithm fc function ))))', query time: 0.11s Refine Results
  1. 121
  2. 122

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
  3. 123

    Power matching approach for GPS coverage extension by Saab, Samer S.

    Published 2006
    “…The inherent problem of the Global Positioning System (GPS), which is signal obstruction, remains the major obstacle that inhibits it from functioning as a "reliable stand-alone" positioning system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 124

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators by I.S. Elkamash (16810689)

    Published 2023
    “…To explain such interesting feature, we suggest a type of analytic continuation where the parametrized divergent hypergeometric series is represented as a finite sum over entire hypergeometric functions. The algorithm is applied to sum the weak-coupling series of the ground state energy of the quartic (divergent), sextic (Gevrey−2) and Octic (Gevrey−3) anharmonic oscillators. …”
  5. 125
  6. 126

    Gas pipeline modelling and control by Whalley, R

    Published 2015
    “…Frequency response techniques are invoked enabling the derivation of simple, robust control algorithms. Confirmation of the results obtained, from the transient response computation of the outputs following input reference and load disturbance changes, are presented. …”
    Get full text
  7. 127
  8. 128
  9. 129

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
    Get full text
    Get full text
    article
  10. 130
  11. 131

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
    Get full text
    Get full text
    article
  12. 132

    DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications by Danya A. Saifaldeen (19498705)

    Published 2024
    “…The system comprises four VLC access points with light fixtures, reinforced by a mirror array sheet, and a mmWave access point with antennas, supported by a reflecting unit sheet. Within the system, both sheets function as IRS. The aim is to enhance the secrecy capacity (SC) of the system by optimizing the beamforming weights at the VLC fixtures, the beamforming weights at the mmWave AP, the mirror array configurations, and the phase shift vector while meeting specific power constraints. …”
  13. 133

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks by Insaf Kraidia (19198012)

    Published 2024
    “…First, introducing a pioneering batch-cumulative approach, the exponential particle swarm optimization (ExPSO) algorithm was developed for meticulous parameter fine-tuning within each batch. …”
  14. 134

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING by Sait, Sadiq M.

    Published 2020
    “…The problem of partitioning appears in several areas ranging from VLSI, parallel programming, to molecular biology. …”
    Get full text
    article
  15. 135

    Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB by Alice AbdelAleem (17753799)

    Published 2023
    “…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
  16. 136

    General iterative heuristics for VLSI multiobjective partitioning by Sait, Sadiq M.

    Published 2003
    “…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
    Get full text
    Get full text
    article
  17. 137

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 138

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…Earlier diagnosis of ASD from brain image is necessary for reducing the effect of disorder. …”
    Get full text
    Get full text
  19. 139

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…Security has always been a privilege for governments and banks, from the old Egyptian civilization to the latest technologies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 140