Search Results - (( intelligence ai protocol algorithm ) OR ( intelligence based flow algorithm ))

Refine Results
  1. 1

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3
  4. 4
  5. 5

    A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients by Rahman, Md Saidur, Md Nor, Nor Saadah

    Published 2024
    “…The other way around, AI is a limb of Computer Science dedicated to developing systems that do what a human does intelligently. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    eVtols : smart air mobility project / Muhammad Faiz Abu Hassan by Abu Hassan, Muhammad Faiz

    Published 2024
    “…The Smart Ocean Mobility Project represents a groundbreaking initiative at the intersection of cutting-edge patrol boat technology and aerial surveillance, driven by artificial intelligence (AI) algorithms. With a strategic focus on transforming maritime security, this project integrates autonomous patrol boats equipped with advanced sensors, communication systems, and autonomous navigation features. …”
    Get full text
    Get full text
    Book Section
  12. 12

    A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications by Mohammad Kamrul, Hasan, Musse Mohamud, Ahmed, Aisha, Hassan Abdalla Hashim, Abdur Razzaque, Shayla Islam, Biswajeet, Pandey

    Published 2020
    “…The revolutionary Artificial Intelligence (AI) enables the industrial revolution to provide a significant performance to engineering solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Classification and detection of intelligent house resident activities using multiagent by ,, Mohd. Marufuzzaman, M. B. I., Raez, M. A. M., Ali, Rahman, Labonnah F.

    Published 2013
    “…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach by Premkumar M., Hashim T.J.T., Ravichandran S., Sin T.C., Chandran R., Alsoud A.R., Jangir P.

    Published 2025
    “…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
    Article
  17. 17

    Analysis of bubble departure and lift-off boiling model using computational intelligence techniques and hybrid algorithms by Quadros, Jaimon Dennis, Mogul, Yakub Iqbal, Ağbulut, Ümit, Gürel, Ali Etem, Khan, Sher Afghan, Akhtar, Mohammad Nishat, Jilte, Ravindra D., Asif, Mohammad

    Published 2024
    “…The bubble departure and lift-off boiling (BDL) model was studied using computational intelligence techniques and hybrid algorithms. Quite a few studies have predicted the relationship between wall heat fluxes and wall temperature in the form of flow boiling curves. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    INTELLIGENT OPTIMIZATION OF INTERLINE POWER FLOW CONTROLLER IN TRANSMISSION SYSTEM by MOHAMED ABDELGADIR, KHALID HAROUN

    Published 2010
    “…A new generation of FACTS controllers, particularly the Interline Power Flow Controller (IPFC) based on voltage source converter (VSC) provides fast power flow control flexibility. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
    Get full text
    Get full text
    Thesis
  20. 20