Search Results - (( intelligence based access algorithm ) OR ( intelligence model using algorithm ))

Refine Results
  1. 1
  2. 2

    Nature-Inspired Drone Swarming for Wildfires Suppression Considering Distributed Fire Spots and Energy Consumption by Alsammak I.L.H., Mahmoud M.A., Gunasekaran S.S., Ahmed A.N., Alkilabi M.

    Published 2024
    “…Therefore, this study presents a new model based on the principles of nature-inspired metaheuristics that uses Swarm Intelligence (SI) to test the effectiveness of using an autonomous and decentralized behaviour for a swarm of Unmanned Aerial Vehicles (UAVs) or drones to detect all distributed fire spots and extinguishing them cooperatively. …”
    Article
  3. 3

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…Parametric and non-parametric modelling of such systems is investigated. Parametric approaches include linear parametric modelling of the system using recursive least squares (RLS) and genetic algorithms (GAS); and non-parametric approaches include multi-layered perceptron neural networks (MLP-NNs) and adaptive neuro-fuzzy inference systems (ANFIS) are employed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of hybrid artificial intelligent based handover decision algorithm by Aibinu, Abiodun Musa, Onumanyi, Adeiza J., Adedigba, A. P., Ipinyomi, M., Folorunso, T. A., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman by Othman, Zulkifli

    Published 2021
    “…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…As we conduction evaluation experiment on our model using openly accessible datasets like PKU-Market-PCB and perform comparative studies with the latest proposed solutions.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
    Get full text
    Get full text
    Article
  9. 9

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  10. 10
  11. 11
  12. 12

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…The proposed system was modelled using Fuzzy Logic algorithms for simulation purposes in order to find the relationship between two fuzzy sets with the computed allocated time.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Assessing Malaysian University English Test (MUET) Essay on Language and Semantic Features Using Intelligent Essay Grader (IEG) by Wong, Wee Sian, Bong, Chih How

    Published 2021
    “…The AES products tend to score essays based on the scoring rubrics of a particular English text context (e.g., TOEFL, GMAT) by employing their proprietary scoring algorithm that is not accessible by the users. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…This paper tackles the problem of 3D VANETs using a centralized clustering model based on the developed Cauchy density model. …”
    Get full text
    Get full text
    Article
  17. 17

    A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks by Goudarzi, S., Hassan, W.H., Anisi, M.H., Soleymani, S.A., Shabanzadeh, P.

    Published 2015
    “…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A preliminary lightweight random forest approach-based image classification for plant disease detection by Mashitah Ibrahim, Muzaffar Hamzah, Mohammad Fadhli Asli

    Published 2022
    “…This lightweight framework is for cost-effective distribution with high performance without requiring extensive computational resources or complex algorithms. With that, this system can be more practical and easier to use.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article