Search Results - (( developing agent context algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- context algorithm »
- implication based »
- developing agent »
- java implication »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
Get full text
Get full text
Article -
2
Embodied conversational agents for H5N1 pandemic crisis
Published 2007“…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems
Published 2024“…Moreover, the Nonlinear Sine Cosine Algorithm-Safe Experimentation Dynamic (NSCA-SED) introduces a hybridization of multi-agent and single-agent algorithms, presenting a dynamic approach with random perturbation to navigate search trajectories effectively, and release design parameters that might be trapped in local optima. …”
Get full text
Get full text
Thesis -
5
Automate customer support handling E-Commerce enquiry using ChatGPT
Published 2024“…The project scope is the development of a comprehensive mechanism for context handling, an inconspicuous human takeover process, and the summarization of entire conversations between customers and automated customer support before handover to human agents. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
Published 2016“…Additionally, this problem exacerbates in the context of SDNs unlike traditional networks. The SDN controller signifies a single point of failure and thus serves as a potential primary target for attackers. …”
Get full text
Get full text
Thesis
