Search Results - (( intelligence a data algorithm ) OR ( intelligence basic computer algorithm ))
Search alternatives:
- intelligence basic »
- intelligence a »
- data algorithm »
- basic computer »
- a data »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
2
Computational biology: where nature meets technology / Ts Faikah Awang @ Ismail and Ts Mohamad Shahrimi Hashim
Published 2023“…It all began in the early 1970s when basic artificial intelligence was developed to create the neural network model for the human brain to generate new algorithms. …”
Get full text
Get full text
Article -
3
-
4
Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan
Published 2017“…In this research, a system is proposed that utilizes and manages traffic light controllers; more specifically an algorithm is presented which dynamically changes the traffic control system based on the vehicular flow data generated by on-road sensor technology. …”
Get full text
Get full text
Get full text
Thesis -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
7
Analysis of watermarking techniques in video
Published 2011Get full text
Get full text
Conference or Workshop Item -
8
-
9
Enhancement of network security by use machine learning
Published 2019“…From the analysis in the simulation results, one can see that the ANNDL is the best algorithm of machine learning process. This method uses many layers to compute or process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…On a smaller game map, the algorithm still takes an acceptable computing time but on a larger size map, the computation time suffers a lot. …”
Get full text
Get full text
Thesis -
13
Modelling of clinical risk groups (CRGs) classification using FAM
Published 2006“…Fuzzy ARTMAP (FAM) is an incremental supervised learning of recognition neural networks in response to input and target pattern [4, 5]. FAM is a fast learning algorithm and used less epoch training [4]. …”
Get full text
Get full text
Conference or Workshop Item -
14
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023Conference Paper -
16
An introduction to swarming robotics: application development trends
Published 2013“…In addition, the existing algorithms are computationally complicated, difficult to be understood by beginners as there are too many parameters. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
Get full text
Get full text
Get full text
Article -
18
-
19
African Buffalo Optimization: A Swarm-Intelligence Technique
Published 2015Get full text
Get full text
Get full text
Article -
20
