Search Results - (( intelligence _ protocol algorithm ) OR ( intelligence system force algorithm ))

Refine Results
  1. 1

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…DPI analysis provides more visibility into the contents of OT traffic based on communication protocols. The advancement in technology has led to the utilization of machine learning/artificial intelligence capability in IDS ICS SCADA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Intelligent Optimization of Force Tracking Parameters for MR Damper Modelling using Firefly Algorithm by Mat Hussin, Ab Talib, Hanim, Mohd Yatim, Nik Mohd Ridzuan, Shaharuddin, Muhamad Sukri, Hadi, Intan Zaurah, Mat Darus, Annisa, Jamali

    Published 2020
    “…To overcome this problem, an intelligent optimization method known as firefly algorithm (FA) was used by this study to optimize the force tracking controller (FTC) parameters as to achieve the exact damping force of MR damper system. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  3. 3
  4. 4

    An Intelligent Active Force Control Algorithm to Control an Upper Extremity Exoskeleton for Motor Recovery by Wan Hasbullah, Mohd Isa, Zahari, Taha, Ismail, Mohd Khairuddin, Anwar, P. P. A. Majeed, Khairul Fikri, Muhammad, Ali, Mohammed A. H., Jamaluddin, Mahmud, Zulkifli, Mohamed

    Published 2016
    “…A proportional-derivative (PD) architecture is employed in this study to investigate its efficacy performing joint-space control objectives. An intelligent AFC algorithm is also incorporated into the PD to investigate the effectiveness of this hybrid system in compensating disturbances. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A fuzzy-active force based control architecture for characterizing a nonlinear MIMO system / Tengku Luqman Tengku Mohamed by Tengku Mohamed, Tengku Luqman

    Published 2016
    “…This study examines the modelling and control of a twin rotor multi-input multi-output (MIMO) system (TRMS). An intelligent Active Force Control (AFC) scheme is utilised to compensate disturbances that a conventional PID control algorithm alone is unable to due to the system’s highly nonlinear behaviour. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  8. 8

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…A number of disturbances in the form of vibratory and impact forces are deliberately introduced into the system to evaluate the system performances. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…The research focuses on the application of an active force control (AFC) strategy with iterative learning control (ILC) algorithms to compensate for the various introduced road profiles or 'disturbances' in a quarter car suspension system as an improvement to ride comfort performance. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…To derive a complete intelligent state-of-the-art hybrid control system, several experiments were conducted in the study. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a robust intelligent controller for a semi-active car suspension system by Abas, Hesham Ahmed Abdul Mutleba

    Published 2022
    “…Semi-active suspension systems outperformed passive and active suspension systems because it contains an intelligent actuator that can give the appropriate force to dissipate unwanted vibration using intelligent and real-time controllers. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15

    Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System by Al-Hameli, Bassam Abdo, Alsewari, Abdulrahman A., Alraddadi, Abdulaziz Saleh, Aldhaqm, Arafat

    Published 2021
    “…Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper by Ahmed, Hesham, As’arry, Azizan, Hairuddin, Abdul Aziz, Hassan, Mohd Khair, Liu, Yunyun, Onwudinjo, Erasmus Cufe Ujunwa

    Published 2022
    “…The semi-active suspension system outperformed other suspension systems because it contains an intelligent actuator that can give the appropriate force to dissipate unwanted vibration using intelligent and real-time controllers. …”
    Get full text
    Get full text
    Article
  17. 17

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper