Search Results - (( intelligence based access algorithm ) OR ( intelligence a access algorithm ))
Search alternatives:
- intelligence based »
- access algorithm »
- intelligence a »
- based access »
- a access »
-
1
-
2
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
3
-
4
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
5
-
6
-
7
-
8
Intelligent dynamic bandwidth allocation algorithm in upstream EPONs
Published 2023“…An upstream access scheme for Ethernet passive optical networks, called the intelligent fuzzy-logic-based dynamic bandwidth allocation algorithm (IFLDBA) has been proposed. …”
Article -
9
-
10
-
11
Maximizing DRL-based energy efficiency in IRS-NOMA using a DDPG algorithm for the next generation of wireless communications
Published 2024“…EE, crucial in Wireless Communications (WCs), measures data transmission relative to energy consumption. This study focuses on a Deep Deterministic Policy Gradient (DDPG) algorithm that intelligently adjusts IRS phase-shift matrices and access point beamforming in NOMA DT. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
15
-
16
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
17
Intelligent cooperative adaptive weight ranking policy via dynamic aging based on NB and J48 classifiers
Published 2017“…Furthermore, using conventional algorithms cannot be well optimized since it requires some decision to evict intelligently before a page is replaced. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
19
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
Get full text
Get full text
Thesis -
20
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis
