Search Results - (( intelligence based access algorithm ) OR ( intelligence valid based algorithm ))*
Search alternatives:
- intelligence based »
- intelligence valid »
- access algorithm »
- based access »
- valid based »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
2
-
3
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
4
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
6
A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks
Published 2015“…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
Get full text
Get full text
Get full text
Article -
7
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
8
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Article -
11
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models
Published 2024“…The potential of the proposed AI-based assistant to significantly improve healthcare accessibility and diagnostic accuracy in underserved areas is demonstrated through rigorous testing, which validates its effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
Get full text
Get full text
Get full text
Thesis -
14
Analysis of boiler operational variables prior to tube leakage fault by artificial intelligent system
Published 2023“…An Intelligent system based on Artificial Neural Network was designed and coded in MATLAB environment. …”
Conference Paper -
15
-
16
-
17
Simulated Annealing Based Strategy for Test Redundancy Reduction
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…The obtained results confirm the complete agreement between MVDR technique and hybrid intelligent swarm PSOGSA algorithm. The proposed MVDRPSOGSA approach can successfully place very sharp nulls (-200 dB deep, on average) at the undesired angles. …”
Get full text
Get full text
Thesis -
19
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. …”
Get full text
Get full text
Article -
20
Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj
Published 2023“…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
Get full text
Get full text
Get full text
Article
