Search Results - (( intelligence ai testing algorithm ) OR ( intelligence task scheduling algorithm ))

Refine Results
  1. 1

    Processing time estimation in precision machining industry using AI / Lim Say Li by Lim, Say Li

    Published 2017
    “…Neural Network (NN) model is chosen as the artificial intelligence approach used in this research. Levenberg-Marquardt algorithm is used as the training algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing by Alobaedy, Mustafa Muwafak Theab

    Published 2015
    “…The main part of RMS is the scheduler algorithm which has the responsibility to map submitted tasks to available resources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…In this work active intelligent control comprises a set of control techniques based on particle swarm optimisation (PSO), real coded genetic algorithm (RCGA) and artificial immune system (AIS). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Prediction of Optimum Cutting Conditions in Dry Turning Operations of S45C Mild Steel using AIS and PSO Intelligent Algorithm by Minhat, Mohamad, Abd Rahman, Md Nizam, Abbas, Adnan Jameel

    Published 2014
    “…The results predicted by AIS and PSO were compared with the experimental values derived from the testing data set. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Improving artificial intelligence models accuracy for monthly streamflow forecasting using grey Wolf optimization (GWO) algorithm by Tikhamarine, Yazid, Souag-Gamane, Doudja, Najah Ahmed, Ali, Kisi, Ozgur, El-Shafie, Ahmed

    Published 2020
    “…The precision of Artificial Intelligence (AI) models can be improved by using hybrid AI models which consist of coupled models. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A kidney algorithm with elitism for combinatorial testing problem by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Kamal Z., Zamli, Alhendawi, Kamal M., Al-Janabi, Ala Aldeen

    Published 2020
    “…Adopting Artificial Intelligence (AI) algorithms as the main algorithm for CIT strategies to generate the most optimal test lists. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Embedded Artificial Intelligent (AI) To Navigate Cart Follower by Tang, Khai Luen

    Published 2018
    “…One of the solution for the problem is to create an Artificial Intelligent (AI) cart follower. Therefore, this research is to create an AI system for the AI cart follower with a visual based sensor. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    Development of optimized maintenance scheduling model for coal-fired power plant boiler by Noor Fazreen Binti Ahmad Fuzi, Ms.

    Published 2023
    “…Computing intelligence is a soft-computing subset of artificial intelligence referring to the potential of a computer to gain knowledge from an experimental observations or specific task. …”
    text::Thesis
  20. 20

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…Based on this, the research employ a linear regression technique in the AI penetration testing. This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article