Search Results - (( evolution optimization interface algorithm ) OR ( ais implementation based algorithm ))

Refine Results
  1. 1

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Many AI-based strategies have been developed, such as Ant Colony, Simulated Annealing, Genetic Algorithm, and Tabu Search. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application of Artificial Intelligence In Smart City by Law, Jia Wei

    Published 2021
    “…This study aims to study the effects of the implementation of AI in the smart city. The objectives of this study are to review the concepts of AI and smart city, conduct the Strength, Weakness, Opportunity, and Threat (SWOT) Analysis of deployment of AI in a smart city, and propose the future trends of AI implementation in a smart city. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Facilitating English Language teaching through AI- based drama in Palestine by Bsharat, Tahani, Sheikh Ahmad, Ismail

    Published 2025
    “…The survey sought to capture their perspectives on AI, AI- based drama techniques, the impact of AI in EFL classrooms, and the challenges associated with its implementation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…The proposed technique is obtained by combining artificial immune network (aiNET) and clonal selection algorithm (CLONALG). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman by Seman, Noraini

    Published 2012
    “…A variety of automatic knowledge acquisition or learning and adaptation concepts need to be established in speech recognition using AI approaches. These key concepts can only be implemented using artificial neural networks (ANNs) approach. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Anomaly detection for vision-based inspection by Chew, Yan Zhe

    Published 2022
    “…The usage of Artificial Intelligence (AI) techniques in vision-based anomaly detection is gaining traction within the manufacturing industry for quality inspection purposes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13
  14. 14

    Embedded Artificial Intelligent (AI) To Navigate Cart Follower by Tang, Khai Luen

    Published 2018
    “…One of the solution for the problem is to create an Artificial Intelligent (AI) cart follower. Therefore, this research is to create an AI system for the AI cart follower with a visual based sensor. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Artificial intelligence techniques applied as estimator in chemical process systems - A literature survey by Ali, J.M., Hussain, Mohd Azlan, Tade, M.O., Zhang, J.

    Published 2015
    “…Hence, in this paper, we provide a broad literature survey of several AI algorithms implemented as estimators in chemical systems together with their advantages, limitations, practical implications and comparisons between one another to guide researchers in selecting and designing the AI-based estimators. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Advancements and challenges in mobile robot navigation: a comprehensive review of algorithms and potential for self-learning approaches by Al Mahmud, Suaib, Kamarulariffin, Abdurrahman, Mohd Ibrahim, Azhar, Haja Mohideen, Ahmad Jazlan

    Published 2024
    “…With the goal of enhancing the autonomy in mobile robot navigation, numerous algorithms (traditional AI-based, swarm intelligence-based, self-learning-based) have been built and implemented independently, and also in blended manners. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20