Search Results - (( intelligence ai protocol algorithm ) OR ( intelligence valid based algorithm ))
Search alternatives:
- protocol algorithm »
- intelligence valid »
- intelligence ai »
- ai protocol »
- valid based »
-
1
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…In doing this, two ANN algorithms (MLP and RBF) and SMO algorithm were employed and compared. …”
Get full text
Get full text
Get full text
Article -
2
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…The other way around, AI is a limb of Computer Science dedicated to developing systems that do what a human does intelligently. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
-
5
-
6
-
7
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
Get full text
Get full text
Thesis -
8
eVtols : smart air mobility project / Muhammad Faiz Abu Hassan
Published 2024“…The Smart Ocean Mobility Project represents a groundbreaking initiative at the intersection of cutting-edge patrol boat technology and aerial surveillance, driven by artificial intelligence (AI) algorithms. With a strategic focus on transforming maritime security, this project integrates autonomous patrol boats equipped with advanced sensors, communication systems, and autonomous navigation features. …”
Get full text
Get full text
Book Section -
9
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
thesis::doctoral thesis -
10
-
11
A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications
Published 2020“…The revolutionary Artificial Intelligence (AI) enables the industrial revolution to provide a significant performance to engineering solutions. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Hybrid Intelligent Warning System for Boiler tube Leak Trips
Published 2017“…The first intelligent warning system (IWS-1) represents the use of pure artificial neural network system whereas the second intelligent warning system (IWS-2) represents merging of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
Get full text
Get full text
Article -
13
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The aim of the research is to introduce novel form of swarm intelligence algorithms based on real echolocation behaviour of bats. …”
Get full text
Get full text
Thesis -
14
A novel artificial intelligence based timing synchronization scheme for smart grid applications
Published 2020“…The revolutionary Artificial Intelligence (AI) enables the industrial revolution to provide a significant performance to engineering solutions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Vision Based Multi Sensor Feedback System For Robot System With Intelligent
Published 2009“…Finally, a set of experiments to validate the proposed algorithms has been conducted. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Cohesive token passing algorithm utilizing software agents
Published 2010“…The results acquired validated the improved results of the new software agent based implementation. …”
Get full text
Get full text
Article -
18
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…Based on the design of modeling elements of Luoshan shadow puppets, this paper analyzes the characteristics of visual elements of shadow puppet creative goods, puts forward an intelligent design algorithm of shadow puppet creative goods based on DL, and explores the computer-aided shadow puppets modeling design strategy driven by artificial intelligence. …”
Get full text
Get full text
Get full text
Proceeding -
19
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
20
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
Get full text
Get full text
Get full text
Article
