Search Results - (( intelligence based access algorithm ) OR ( intelligence based using algorithms ))
Search alternatives:
- intelligence based »
- access algorithm »
- using algorithms »
- based access »
- based using »
-
1
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…In this paper, MR fluid damper with Fuzzy-PID controller is examined to be optimized using a modified DE algorithm. However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
Get full text
Get full text
Article -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
4
-
5
-
6
Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption
Published 2024“…Therefore, this study presents a new model based on the principles of nature-inspired metaheuristics that uses Swarm Intelligence (SI) to test the effectiveness of using an autonomous and decentralized behaviour for a swarm of Unmanned Aerial Vehicles (UAVs) or drones to detect all distributed fire spots and extinguishing them cooperatively. …”
Article -
7
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
Get full text
Get full text
Thesis -
8
Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea
Published 2018“…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
Get full text
Get full text
Thesis -
9
Intelligent dynamic bandwidth allocation algorithm in upstream EPONs
Published 2023“…An upstream access scheme for Ethernet passive optical networks, called the intelligent fuzzy-logic-based dynamic bandwidth allocation algorithm (IFLDBA) has been proposed. …”
Article -
10
-
11
Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman
Published 2021“…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…The performance of the newly developed k � step ahead ANN based RSS prediction algorithm was evaluated using simulated and real data acquired from available mobile communication networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
15
-
16
-
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Password-based authentication is considered the cheapest and most popular and commonly used methods of computer authentication. …”
text::Thesis -
18
-
19
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The second controller design strategy is based on a cost function optimization using GAS. …”
Get full text
Get full text
Get full text
Thesis -
20
Evaluating the Efficacy of Intelligent Methods for Maximum Power Point Tracking in Wind Energy Harvesting Systems
Published 2024“…Furtherly, Artificial Intelligence (AI)-based MPPT algorithms were proposed for the WEHS as either standalone or integrated with the traditional MPPT methods. …”
Review
