Showing 41 - 60 results of 74 for search '(( element data algorithm ) OR ((( agent modeling algorithm ) OR ( level coding algorithm ))))', query time: 0.15s Refine Results
  1. 41

    Reinforcement Learning-Based School Energy Management System by Yassine Chemingui (18891757)

    Published 2020
    “…After cloning the baseline strategy, the agent learns with proximal policy optimization in an actor-critic framework. …”
  2. 42

    A hybrid approach for XML similarity by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 43

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 44

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …”
  5. 45

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
    Get full text
  6. 46

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 47

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  8. 48
  9. 49

    Recent advances on artificial intelligence and learning techniques in cognitive radio networks by Abbas, Nadine

    Published 2015
    “…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 50

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
    Get full text
  11. 51
  12. 52

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  13. 53
  14. 54
  15. 55

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
  16. 56

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  17. 57

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  18. 58

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  19. 59
  20. 60