[Retracted] Enhance‐Net: An Approach to Boost the Performance of Deep Learning Model Based on Real‐Time Medical Images

V Narayan, PK Mall, A Alkhayyat, K Abhishek… - Journal of …, 2023 - Wiley Online Library
Real‐time medical image classification is a complex problem in the world. Using IoT
technology in medical applications assures that the healthcare sectors improve the quality of …

Neurosymbolic reinforcement learning and planning: A survey

K Acharya, W Raza, C Dourado… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The area of neurosymbolic artificial intelligence (Neurosymbolic AI) is rapidly develo**
and has become a popular research topic, encompassing subfields, such as neurosymbolic …

Efficacious implementation of deep Q-routing in opportunistic network

R Dalal, M Khari - Soft Computing, 2023 - Springer
Opportunistic network (Oppnet) is consisting of wireless nodes, which follows the Bluetooth
transmission range between nodes. These kinds of networks are capable to handle long …

An augmented reality for an arabic text reading and visualization assistant for the visually impaired

I Ouali, MB Halima, A Wali - Multimedia Tools and Applications, 2023 - Springer
Text, as one of humanity's most influential innovations, has played an important role in
sha** our lives. Reading a text is a difficult task due to several reasons factors, such as …

A Reinforcement Learning Review: Past Acts, Present Facts and Future Prospects

B Kommey, OJ Isaac, E Tamakloe… - IT Journal Research and …, 2024 - journal.uir.ac.id
Reinforcement Learning (RL) is fast gaining traction as a major branch of machine learning,
its applications have expanded well beyond its typical usage in games. Several subfields of …

[HTML][HTML] Dynamic Cyberattack Simulation: Integrating Improved Deep Reinforcement Learning with the MITRE-ATT&CK Framework

SH Oh, J Kim, J Park - Electronics, 2024 - mdpi.com
As cyberattacks become increasingly sophisticated and frequent, it is crucial to develop
robust cybersecurity measures that can withstand adversarial attacks. Adversarial simulation …