Search Results - (( intelligence _ access algorithm ) OR ( intelligence based modeling algorithm ))

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Therefore, this study presents a new model based on the principles of nature-inspired metaheuristics that uses Swarm Intelligence (SI) to test the effectiveness of using an autonomous and decentralized behaviour for a swarm of Unmanned Aerial Vehicles (UAVs) or drones to detect all distributed fire spots and extinguishing them cooperatively. …”
    Article
  4. 4

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  5. 5

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of hybrid artificial intelligent based handover decision algorithm by Aibinu, Abiodun Musa, Onumanyi, Adeiza J., Adedigba, A. P., Ipinyomi, M., Folorunso, T. A., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…This thesis presents investigations into the development of an intelligent framework for modelling and active vibration control (AVC) of flexible structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman by Othman, Zulkifli

    Published 2021
    “…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  16. 16

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A preliminary lightweight random forest approach-based image classification for plant disease detection by Mashitah Ibrahim, Muzaffar Hamzah, Mohammad Fadhli Asli

    Published 2022
    “…In recent years, the rapid development of environmental sensors and artificial intelligence is changing the traditional mode of agricultural production and moving towards intelligent and efficient precision agriculture. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…The development has included a traffic generation model, mobility model for generating driving behavior, and an algorithm for enabling modeling of road curvature based on an adjacency list that defines the road’s points that define a straight-line segment. …”
    Get full text
    Get full text
    Article