Search Results - (( intelligence based access algorithm ) OR ( intelligence based learning algorithm ))
Search alternatives:
- intelligence based »
- learning algorithm »
- access algorithm »
- based access »
-
1
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
2
-
3
Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications
Published 2025“…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
Get full text
Get full text
Thesis -
5
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
7
-
8
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
9
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…In this paper, a novel URL phishing detection technique based on BERT feature extraction and a deep learning method is introduced. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
A preliminary lightweight random forest approach-based image classification for plant disease detection
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
Get full text
Get full text
Get full text
Article -
14
WiMAX Traffic Forecasting Based On Artificial Intelligence Techniques
Published 2024thesis::doctoral thesis -
15
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Article -
16
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
18
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
19
Artificial neural networks based optimization techniques: A review
Published 2023“…In the last few years, intensive research has been done to enhance artificial intelligence (AI) using optimization techniques. In this paper, we present an extensive review of artificial neural networks (ANNs) based optimization algorithm techniques with some of the famous optimization techniques, e.g., genetic algorithm (GA), particle swarm optimization (PSO), artificial bee colony (ABC), and backtracking search algorithm (BSA) and some modern developed techniques, e.g., the lightning search algorithm (LSA) and whale optimization algorithm (WOA), and many more. …”
Review -
20
