Search Results - (( intelligence based access algorithm ) OR ( intelligence based learning algorithm ))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    Article
  2. 2
  3. 3

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Artificial neural networks based optimization techniques: A review by Abdolrasol M.G.M., Suhail Hussain S.M., Ustun T.S., Sarker M.R., Hannan M.A., Mohamed R., Ali J.A., Mekhilef S., Milad A.

    Published 2023
    “…In the last few years, intensive research has been done to enhance artificial intelligence (AI) using optimization techniques. In this paper, we present an extensive review of artificial neural networks (ANNs) based optimization algorithm techniques with some of the famous optimization techniques, e.g., genetic algorithm (GA), particle swarm optimization (PSO), artificial bee colony (ABC), and backtracking search algorithm (BSA) and some modern developed techniques, e.g., the lightning search algorithm (LSA) and whale optimization algorithm (WOA), and many more. …”
    Review
  20. 20