Search Results - (( intelligence a process algorithm ) OR ( intelligence _ access algorithm ))

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis
  10. 10

    The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement by Hosseini E., Al-Ghaili A.M., Kadir D.H., Daneshfar F., Gunasekaran S.S., Deveci M.

    Published 2025
    “…Therefore, proposing an efficient meta-heuristic to improve the inputs of the trainer in ML would be significant. In this study, a new idea centered on seed growth, Seed Growth Algorithm (SGA), as a conditional convergent evolutionary algorithm is proposed for optimizing several discrete and continuous optimization problems. …”
    Article
  11. 11

    Development of hybrid artificial intelligent based handover decision algorithm by Aibinu, Abiodun Musa, Onumanyi, Adeiza J., Adedigba, A. P., Ipinyomi, M., Folorunso, T. A., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…The underlying factor responsible for this has been traced to the Handover decision module in the Handover process. Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The environment is implemented in such a way that it allows the user to simulate and visualise behaviour of flexible structures with given physical characteristics, to test and validate controller designs, and furthermore, to execute such processes repeatedly in a friendly and easy manner. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Energy-efficient federated learning with resource allocation for green IoT edge intelligence in B5G by Ngah, Razali, Salh, Adeeb, Audah, Lukman, Abdullah, Qazwan, Kim, Kwang Soon, Al-Moliki, Yahya Mohammed Hameed, AlJaloud, Khaled A., Talib, Md Hairul Nizam

    Published 2023
    “…The simulation results indicated that the proposed ADA can adapt the central processing unit frequency and power transmission control to reduce energy consumption at the cost of a small growth of FL time.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…It shows that our proposed algorithm improved the recognition rate with negligible additional processing time.…”
    Get full text
    Get full text
    Get full text
    Book
  17. 17

    A review on the applications of PSO-based algorithm in demand side management: Challenges and opportunities by Sulaima, Mohamad Fani, Zaini, Farah Anishah, Wan Abdul Razak, Intan Azmira, Zulkafli, Nur Izyan, Mokhlis, Hazlie

    Published 2023
    “…Owing to its simplicity and consistent performance in fast convergence time, Particle Swarm Optimization (PSO) is widely used as a part of the swarm AI algorithm and has become a prominent technique in the optimization process to exploit the full benefit of the demand-side program. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Artificial intelligence?powered electrochemical sensor: Recent advances, challenges, and prospects by Nashruddin S.N.A.B.M., Salleh F.H.M., Yunus R.M., Zaman H.B.

    Published 2025
    “…Still, they also pose challenges such as data privacy, sensor stability, and algorithmic bias. This paper highlights the critical advances in material innovation, biorecognition elements, signal transduction, data processing, and intelligent decision systems necessary for developing next-generation wearable and implantable devices. …”
    Review
  19. 19

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20