Search Results - (( intelligence _ protocol algorithm ) OR ( intelligence based force algorithm ))

Search alternatives:

Refine Results
  1. 1

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The important new aspect of ACR-QoS is the combination of constraint-based routing and DiffServ architecture, in Swarm Intelligence (SI) structure where a set of artificial ants is used to determine the optimal path for each class to construct class-based routing tables. …”
    Get full text
    Get full text
    Thesis
  2. 2

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…DPI analysis provides more visibility into the contents of OT traffic based on communication protocols. The advancement in technology has led to the utilization of machine learning/artificial intelligence capability in IDS ICS SCADA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  4. 4

    An Intelligent Active Force Control Algorithm to Control an Upper Extremity Exoskeleton for Motor Recovery by Wan Hasbullah, Mohd Isa, Zahari, Taha, Ismail, Mohd Khairuddin, Anwar, P. P. A. Majeed, Khairul Fikri, Muhammad, Ali, Mohammed A. H., Jamaluddin, Mahmud, Zulkifli, Mohamed

    Published 2016
    “…This paper presents the modelling and control of a two degree of freedom upper extremity exoskeleton by means of an intelligent active force control (AFC) mechanism. The Newton-Euler formulation was used in deriving the dynamic modelling of both the anthropometry based human upper extremity as well as the exoskeleton that consists of the upper arm and the forearm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…ILC algorithm is implemented into AFC-based control scheme to reduce its complexity and hence faster response, by replacing the use of artificial intelligence (Al) method as proposed by previous researcher. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
    Get full text
    Get full text
    Monograph
  13. 13

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  14. 14
  15. 15

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Geographical and maximum distance on-demand routing algorithm G-MDORA by Mohammed D., Bin Mansor M., Hock G.C.

    Published 2024
    “…In this paper, we propose geographical and maximum distance on-demand routing algorithm (G-MDORA) that combines the advantages of geographic routing protocol (GRP) and MDORA protocol for Ad hoc routing between vehicle to vehicle (V2V). …”
    Article
  20. 20

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. …”
    Article