Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
101
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
-
102
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In this research, a novel dataset of fake job postings is proposed, formed by the combination of job postings from three different sources. …”
-
103
Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations
Published 2025“…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
-
104
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
-
105
-
106
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…”
-
107
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
108
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
109
-
110
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
111
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
112
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…Federated Learning (FL) is a novel distributed privacy-preserving learning paradigm, which enables the collaboration among several participants (e.g., Internet of Things devices) for the training of machine learning models. …”
Get full text
Get full text
Get full text
masterThesis -
113
-
114
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
Published 2021“…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
-
115
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
116
An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan
Published 2024“…In this research, we have ameliorated the performance of the recently-introduced novel energy pattern factor method (NEPFM) via a direct search algorithm, i.e., simplex search algorithm (SSA). …”
-
117
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
118
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…”
-
119
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
120
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”