Search Results - (( intelligence based _ algorithm ) OR ( intelligence risk based algorithm ))

Refine Results
  1. 1

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
    thesis::doctoral thesis
  2. 2
  3. 3

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Recent Applications of Artificial Intelligence in the Detection of Gastrointestinal, Hepatic and Pancreatic Diseases by Kumar, R., Khan, F.U., Sharma, A., Aziz, I.B.A., Poddar, N.K.

    Published 2022
    “…There has been substantial progress in artificial intelligence (AI) algorithms and their medical sciences applications in the last two decades. …”
    Get full text
    Get full text
    Article
  6. 6

    Recent Applications of Artificial Intelligence in the Detection of Gastrointestinal, Hepatic and Pancreatic Diseases by Kumar, R., Khan, F.U., Sharma, A., Aziz, I.B.A., Poddar, N.K.

    Published 2022
    “…There has been substantial progress in artificial intelligence (AI) algorithms and their medical sciences applications in the last two decades. …”
    Get full text
    Get full text
    Article
  7. 7

    Methane plume localization with enhanced self-best reduction and Gaussian improved particle swarm optimization (GiPSO) by Liew, Jia Hun

    Published 2024
    “…Secondly, our research questions how the Gaussian gas plume model can address the adaptation of swarm intelligence in drone-based gas leakage detection. To address swarm intelligence adaptation in drone-based gas leakage detection, we investigate the existing swarm intelligence capability in optimizing dynamical problems in gas plume detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Reliability assessment of power system generation adequacy with wind power using population-based intelligent search methods by Kadhem, Athraa Ali

    Published 2017
    “…The proposed intelligent algorithms would rely on the population intelligent search (PIS) techniques considered as viable replacement for the MCS method in assessing the reliability indices of non-chronological system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Systematic review on Artificial Intelligence (AI) enabled insurance sector by Yao Di, Bamini KPD Balakrishnan

    Published 2025
    “…This study looks into the application of AI technology in the insurance industry, through a systematic literature review, the study initially sorts out the status and progress of existing studies on the application of AI based on risk assessment, claims processing, customer service, and product personalization. …”
    Get full text
    Get full text
    Article
  10. 10

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: a comprehensive review by Krishna, Shwetank, Ridha, Syahrir, Vasant, Pandian M., Ilyas, Suhaib Umer, Sophian, Ali

    Published 2020
    “…These predictive and detecting models comprise of Artificial Intelligence (AI) algorithms that require improvements for data reduction, universal prediction and compatibility. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: A comprehensive review by Krishna, S., Ridha, S., Vasant, P., Ilyas, S.U., Sophian, A.

    Published 2020
    “…These predictive and detecting models comprise of Artificial Intelligence (AI) algorithms that require improvements for data reduction, universal prediction and compatibility. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al] by Boudville, Rozan, Abdul Wahab, Afif Luqmanulhakim, Wan Zukenani, Wan Izzat Hakimi, Mohd Khelmy, Muhammad Adly Hisyam, Khiruddin, Nur Raihah

    Published 2025
    “…Headwater phenomena, characterised by rapid increases in river levels and flow velocity, pose significant risks to downstream communities. This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…Thus, the objective of this chapter is to study the design of an Expert System called ProtectiveRelay Analysis System (PRAY), which is imbedded with a rule base construction module. This module is to provide the facility of intelligently maintaining the knowledge base of PRAY through the prior discovery of relay operations (association) rules from a novel integrated data mining approach of Rough-Set-Genetic-Algorithm-based rule discovery and Rule Quality Measure. …”
    Get full text
    Get full text
    Book Section