Search Results - (( developing agent context algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
    Get full text
    Get full text
    Article
  2. 2

    Embodied conversational agents for H5N1 pandemic crisis by Goh, Ong Sing, Fung, Chun Che, Wong, Kok Wai, Depickere, Arnold

    Published 2007
    “…A Crisis Communication Network, called CCNet, is established based on a novel algorithm incorporating natural language query and embodied conversation agent simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems by Mohd Helmi, Suid

    Published 2024
    “…Moreover, the Nonlinear Sine Cosine Algorithm-Safe Experimentation Dynamic (NSCA-SED) introduces a hybridization of multi-agent and single-agent algorithms, presenting a dynamic approach with random perturbation to navigate search trajectories effectively, and release design parameters that might be trapped in local optima. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automate customer support handling E-Commerce enquiry using ChatGPT by Teo, Wen Jin

    Published 2024
    “…The project scope is the development of a comprehensive mechanism for context handling, an inconspicuous human takeover process, and the summarization of entire conversations between customers and automated customer support before handover to human agents. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Additionally, this problem exacerbates in the context of SDNs unlike traditional networks. The SDN controller signifies a single point of failure and thus serves as a potential primary target for attackers. …”
    Get full text
    Get full text
    Thesis