Search Results - (( developing agent prevention algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    A simulated Kalman filter optimizer with white hole operator by Zuwairie, Ibrahim, Suad Khairi, Mohammed, Badaruddin, Muhammad, Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Tasiransurini, Ab Rahman, Norazian, Subari

    Published 2018
    “…Meanwhile, a white hole operator has been recently introduced to prevent premature convergence in black hole algorithm (BHA). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning by Ahmed Abo Mosali, Najm Addin Mohammed

    Published 2022
    “…Fourth, an enhancement of the rewarding function by including piecewise decomposition was used to enable more stable learning behaviour of the policy and move out from the linear reward to the achievement formula. Fifth, a novel agent selection algorithm was developed to enable the selection of the best agent and avoid under-fitting and over-fitting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Deep reinforcement learning based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…Finally, in the safety efficiency analysis phase, we investigated the safety efficiency performance of the agent vehicle in both single-agent and multi-agent autonomous driving environments. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Deep reinforcement learning-based driving strategy for avoidance of chain collisions and its safety efficiency analysis in autonomous vehicles by Abu Jafar, Md Muzahid, Syafiq Fauzi, Kamarulzaman, Rahman, Md. Arafatur, Alenezi, Ali H.

    Published 2022
    “…Finally, in the safety efficiency analysis phase, we investigated the safety efficiency performance of the agent vehicle in both single-agent and multi-agent autonomous driving environments. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of autonomous radiation mapping robot by Zakaria, Abd Hafiz, Mohd Mustafah, Yasir, Abdullah, Jaafar, Alang Rashid, Nahrul Khair, Abdullah, Taufiq

    Published 2017
    “…A grid based algorithm was develop to build the radiation map. The system was then tested under several conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Twin delayed deep deterministic policy gradient-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage training by Abo Mosali, Najmaddin, Shamsudin, Syariful Syafiq, Alfandi, Omar, Omar, Rosli, AL-Fadhali, Najib

    Published 2022
    “…In this article, the Twin Delayed Deep Deterministic Policy Gradient Algorithm (TD3), as recent and composite architecture of RL, was explored as a tracking agent for the UAV-based target tracking problem. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of autonomous radiation mapping robot by Zakaria, Abd Hafiz, Mohd Mustafah, Yasir, Abdullah, Jaafar, Alang Rashid, Nahrul Khair, Abdullah, Taufiq

    Published 2017
    “…A grid based algorithm was develop to build the radiation map. The system was then tested under several conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Inhibition of dengue virus entry into target cells using synthetic antiviral peptides by Alhoot, M.A., Rathinam, A.K., Wang, S.M., Manikam, R., Sekaran, S.D.

    Published 2013
    “…Moreover these peptides though designed against the conserved region in DENV-2 would have the potential to be active against all the serotypes of dengue and might be considered as Hits to begin designing and developing of more potent analogous peptides that could constitute as promising therapeutic agents for attenuating dengue infection.…”
    Get full text
    Get full text
    Article
  13. 13

    Solubility enhancement of decitabine as anticancer drug via green chemistry solvent: Novel computational prediction and optimization by Nader Ibrahim Namazi, Sameer Alshehri, Rawan Bafail, Bader Huwaimel, Amal M. Alsubaiyel, Ali H. Alamri, Ahmed D. Alatawi, Hossam Kotb, Mohd Sani Sarjadi, Md. Lutfor Rahman, Mohammed A.S. Abourehab

    Published 2022
    “…Decitabine with the chemical formula C₈H₁₂N₄O₄ is a chemotherapeutic agent applied for the treatment of disparate bone-marrow-related malignancies such as acute myeloid leukemia (AML) by preventing DNA methyltransferase and activation of silent genes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan by Adnan, -

    Published 2016
    “…Moreover, at present, the control plane has no built-in security mechanism that prevents malicious SDN agents from sending authorized but forged flows to corrupt the controller state or bring the entire network down, in the worst case, even if the OpenFlow is Transport Layer Security (TLS) enabled. …”
    Get full text
    Get full text
    Thesis