Search Results - (( intelligence a process algorithm ) OR ( intelligence system vs algorithm ))

Refine Results
  1. 1
  2. 2

    Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid by Abdul Hamid, Zulkiffli

    Published 2013
    “…At first, in producing a good optimization algorithm, a hybridization technique was proposed for adopting the finest features of two different algorithms; namely the Genetic Algorithm (GA) and continuous domain Ant Colony Optimization (ACOr). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Classroom finder system with student availability, space and time constraint by Loh, Yong Bin

    Published 2024
    “…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Multi-target tracking algorithm in intelligent transportation based on wireless sensor network by Lei, Yang, Wu, Yuan, Khan Chowdhury, Ahmed Jalal

    Published 2018
    “…A multi-target tracking algorithm using wireless sensors in an intelligent transportation system is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…This research has a high potential of being expanded into cyber threat hunting process in providing a more proactive cybersecurity environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Real-world optimizations, such as forecasting streamflow, are a complicated process that is highly non-linear and multi-modal, demanding the use of a suitable modeling tool, with an emphasis on artificial intelligence algorithms, to get befitting forecast results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20