7 Questions 51 Answers 0 Followers
Questions related from Anil Kamboj
Four layer parameters of CNN are given in the table (figure attached). The first convolution layer has 1x9x9 input. After applying the 20 filters of size 4x4 how does the output 5x5x20? can...
16 December 2022 356 3 View
Supervised, Unsupervised, Reinforcement, Deep learning, and federated learning (FL) are classical and contemporary techniques of machine learning. Each technique has its own advantages and...
28 September 2021 6,663 3 View
Cooperative communication (CC) can be explored to counter eavesdropping. Relaying and jamming are the sub techniques of (CC). However, Jamming is used to counter the strong eavesdroppers. Is there...
22 September 2021 7,282 4 View
Machine learning has become a hot topic in the last few years. However, the identification of a perfect ML algorithm for a particular application is still not easy. Therefore, I have two...
25 June 2021 3,264 5 View
Cryptography-based security provides security with the help of keys and some encryption algorithms. The security is unprovable and challenged by code-breaking algorithms and quantum computers....
15 May 2021 517 3 View
Cooperative relays have been studied to enhance the physical layer security. Node selection and artificial noise generation are used to degrade the performance of eavesdroppers. Recently,...
02 May 2021 4,946 1 View
Ablation study has its roots in the field of experimental neuropsychology of the 1960s and 1970s, where parts of animals’ brains were removed to study the effect that this had on their behavior....
08 March 2021 9,672 5 View