Search Results - (( intelligence based ((cell algorithm) OR (rsa algorithm)) ) OR ( intelligence a data algorithm ))
Search alternatives:
- intelligence based »
- cell algorithm »
- intelligence a »
- data algorithm »
- rsa algorithm »
- a data »
-
1
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
2
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
3
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
4
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
5
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
Get full text
Get full text
Thesis -
6
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
10
-
11
Decision tree-based approach for online management of PEM fuel cells for residential application
Published 2004“…In this research, a Decision Tree (DT) algorithm is employed to obtain the optimal, or quasioptimal, settings of the fuel cell online and in a general framework. …”
Get full text
Get full text
Thesis -
12
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
13
Decision tree-based approach for online management of pem fuel cells for residential application
Published 2004“…In this research, a Decision Tree (DT) algorithm was employed to obtain the optimal, or quasi-optimal, settings of the fuel cell online and in a general framework. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Aplikasi Rangkaian Neural HMLP Untuk Saringan Barah Pangkal Rahim Berdasarkan Imej Thinprep
Published 2006“…Diagnosis system based on artificial intelligence such as neural network has been proved in increasing the diagnostic performance. …”
Get full text
Get full text
Monograph -
15
Prediction of photovoltaic system output using hybrid Cuckoo Search Least Square Support Vector Machine / Muhammad Aidil Adha Aziz
Published 2019“…The electrical system photovoltaic (PV) modules for special design considerations due to unpredictable and sudden changes in weather conditions such as the solar irradiation level as well as the cell operating temperature. This thesis presents a practical and reliable approach for the prediction of PV power output using an intelligent-based technique namely Cuckoo Search Algorithm - Least Square Support Vector Machine (CS-LSSVM). …”
Get full text
Get full text
Thesis -
16
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…The third scheme is a fuzzy logic-based self-adaptive handover (called FuzSAHO) for handover decision to provide an intelligent self-adaptive handover parameters technique based on received signal strength indicator (RSSI) and MS velocity. …”
Get full text
Get full text
Thesis -
17
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…This dissertation shows about the project details in developing a Bus Tracking System (BTS) by predicting the time arrival of a bus using simulation data. …”
Get full text
Get full text
Final Year Project -
18
Energy Management System For Three-Wheel Light Electric Vehicle Using Multi-Sources Energy Models
Published 2016“…A rule-based control algorithm which contains eight states in EMS is designed to control power switches and to ensure sufficient energy is delivered to the load. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
On equivalence of FIS and ELM for interpretable rule-based knowledge representation
Published 2023“…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item
