Search Results - (( intelligence _ process algorithm ) OR ( intelligence valid access algorithm ))

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…This thesis presents investigations into the development of an intelligent framework for modelling and active vibration control (AVC) of flexible structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Evaluating critical success factors in AI-driven drug discovery using AHP: a strategic framework for optimization by Mohamed Talib, Amir, Al-Hgaish, Areen Metib, Binti Atan, Rodziah, Alshammari, Abdulaziz, Omar Alomary, Fahad, Yaakob, Razali, Alsahli, Abdulaziz, Osman, Mohd Hafeez

    Published 2025
    “…Expert-driven pairwise comparisons identified Accuracy (ACC), Generalizability (GEN), and Experimental Validation (EV) as top priorities, highlighting the importance of reliable data, robust algorithms, and rigorous validation processes to ensure trustworthy AI outputs. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    AI Adoption for Steam Boiler Trip Prevention in Thermal Power Plants by Ismail F.B., Al-Kayiem H.H., Kazem H.A.

    Published 2025
    “…This study introduces two advanced artificial intelligence systems designed to model and predict various boiler trips, playing a pivotal role in maintaining boilers' normal and safe functioning. …”
    Article
  10. 10
  11. 11
  12. 12

    Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj by Othman, Ahmad Al Baqir, Ahmad, Salmiah, Badron, Khairayu, Altalmas, Tareq M. K.

    Published 2023
    “…Results shows that the algorithm was able to detect the letters produced at throat area, which are also known as Izhar Halqi letters. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Real-time implementation of twelve-lead automated electrocardiogram system measurement for QT dispersion analysis by Jamaludin, Mohd. Najeb

    Published 2007
    “…Research and study of the electrocardiogram evolves with the advancement of digital signal processing and artificial intelligence. Unfortunately, readily available electrocardiogram machines in the market do not provide automated measurement of the QT dispersion. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  17. 17

    Lane detection in autonomous vehicles : A systematic review by Noor Jannah, Zakaria, Mohd Ibrahim, Shapiai, Rasli, Abd Ghani, Mohd Najib, Mohd Yassin, Mohd Zamri, Ibrahim, Nurbaiti, Wahid

    Published 2023
    “…Also, the paper covered the equipment used to collect the dataset for the training process and the dataset used for network training, validation, and testing. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
    Conference paper
  19. 19

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20