Search Results - (( intelligence a bit algorithm ) OR ( intelligence based e algorithm ))

Refine Results
  1. 1
  2. 2

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The wireless system has been tested using different distances between SDR antennas. The received power, bit loss percentage and PSNR for the received image have been obtained, results shows a 35dB PSNR for normal distance between SDR antennas (20cm) and 7dB for 150cm, while bits are totally lost when reaching 200cm.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Routing based multi-agent system for network reliability in the smart microgrid by Singh, N., Elamvazuthi, I., Nallagownden, P., Ramasamy, G., Jangra, A.

    Published 2020
    “…In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. …”
    Get full text
    Get full text
    Article
  4. 4

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…It connected the physical devices to the Internet and made them become more intelligent. In home automation system based on IoT, user-requested operations may have malfunction problems when bits error gets generated due to heavy noise in the fading channel. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…The implementation results have shown that this watermarking algorithm has high level of imperceptibility and the watermark bit were all recovered correctly. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17
  18. 18
  19. 19

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis