Search Results - (( based constructive based algorithm ) OR ( ais implementation using algorithm ))

Refine Results
  1. 1

    Scheduling Algorithm For Lot Movement in Semiconductor Wafer Fabrication by Norzieyuswati, Md Zenal

    Published 2008
    “…Two primary approaches to the scheduling problem in the semiconductor wafer fabrication industry, which are heuristic rules and Artificial Intelligence (AI) optimization method, are discussed. Imitating the collective activities of ant colonies, an approach to constructing pheromone-based scheduling algorithm using Ant Colony Optimization for lot movement in semiconductor wafer fabrication process is propose to be implemented in SilTerra Malaysia.…”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function by Tan, Min Keng

    Published 2019
    “…However, the evaluation function used in the AI is developed based on historical traffic data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Preventing DoS at the network or infrastructure level typically depends on implementing an IDS. This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  6. 6

    Artificial intelligence technique in solving nano-process parameter optimization problem / Norlina Mohd Sabri...[et al.] by Mohd Sabri, Norlina, Puteh, Mazidah, Md Sin, Nor Diyana

    Published 2017
    “…The techniques are Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimal overcurrent relay coordination in wind farm using genetic algorithm by Razaei, Nima

    Published 2015
    “…Many suggestions have been made and approaches implemented, however one of the most prominent methods is the use of Genetic Algorithm (GA) to improve the function and coordination of OCRs. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…Further analysis comparing the selected models based on the confusion matrix shows that YOLOv8 demonstrates more accurate predictions, while YOLOv5 and YOLOv7 primarily detect background, leading to minimal object detection within the bounding boxes.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    AI technology factors mediated via intention to use in UAE petroleum companies case study by Alblooshi, Surour Mohammed Surour Hamada

    Published 2024
    “…These factors encompass perceived ease of use, perceived usefulness, technology attitude towards AI, perceived knowledge in AI, and behavioral intention to use AI. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…In this project, a web application and a web service were proposed and implemented. The used car dealership web application was implemented with ASP.NET Core. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…The approach is realised within SISO and SIMO AVC structures using RCGA, PSO and AIS algorithms. These are implemented on the flexible plate structure with various disturbance signals. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Ant system-based feature set partitioning algorithm for classifier ensemble construction by Abdullah, , Ku-Mahamud, Ku Ruhana

    Published 2016
    “…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…These problem can be solved using AI technology. Reinforcement is the process of strengthening an army and it is a crucial issue in gaming design as well. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization by Kamal Zuhairi, Zamli, Din, Fakhrud, Alhadawi, Hussam S.

    Published 2023
    “…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article