Showing 1 - 15 results of 15 for search 'delay operation algorithm', query time: 0.05s Refine Results
  1. 1

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. In FT-Block (Federated transfer learning blockchain), several blockchains are applied to preserve privacy and security for all types of industrial applications. …”
  2. 2

    Secure and Anonymous Communications Over Delay Tolerant Networks by Spiridon Bakiras (16896408)

    Published 2020
    “…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
  3. 3

    STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization by Muhammad Salman Khan (7202543)

    Published 2025
    “…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …”
  4. 4

    Fuzzy simulated evolution algorithm for VLSI cell placement by Sait, Sadiq M.

    Published 2003
    “…In this paper, we present a fuzzy simulated evolution (FSE) algorithm to tackle this problem. Identification of near optimal solutions is achieved through a novel goal-directed fuzzy search approach. …”
    Get full text
    article
  5. 5
  6. 6

    Digital circuit design through simulated evolution (SimE) by Sait, Sadiq M.

    Published 2003
    “…Two goodness measures are designed to guide the selection and allocation operations of SimE. Area, power and delay are considered in the optimization of circuits. …”
    Get full text
    Get full text
    article
  7. 7

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…Running the tracking algorithm on two PCs in parallel allowed: 1) a parallel image grabbing delay of 60 ms; 2) a stereo matching delay of 50 ms; and 3) a global refresh rate of 9 Hz.…”
    Get full text
    Get full text
    article
  8. 8

    Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks by Kherraf, Nouha

    Published 2019
    “…Managing the heterogeneity of the workload generated by IoT devices, especially in terms of computing and delay requirements, while being cognizant of the cost to network operators requires an efficient dimensioning of the MEC-enabled network infrastructure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 9
  10. 10

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…In addition, the transmission data rate was correlated to packet loss and delay and had higher impact than video frame rate and codec type.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 11

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…Genetic algorithm, which is a heuristic optimization technique, is used to ¯nd the system delays of the linear model, which are used in dynamical neural network model. …”
    Get full text
    masterThesis
  12. 12
  13. 13

    Optimal supercharge scheduling of electric vehicles by Atallah, Ribal F.

    Published 2018
    “…The contemporary problem of scheduling the recharge operations of electric vehicles (EVs) has gained a lot of research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 14
  15. 15

    A novel network-based SIS framework for improved GA performance by Tohme, Rawane

    Published 2025
    “…Then, infected nodes can spread their genetic traits to neighboring susceptible nodes through basic genetic algorithm operations within the SIS framework and based on defined probabilities. …”
    Get full text
    Get full text
    Get full text
    masterThesis