Search Results - (( intelligence based aims algorithm ) OR ( intelligence a process algorithm ))
Search alternatives:
- intelligence based »
- process algorithm »
- aims algorithm »
- intelligence a »
- based aims »
- a process »
-
1
A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing
Published 2024“…The dissertation aims to develop an effectively decomposed time-series nongradient- based artificial intelligence model for forecasting a time-series regression machine learning task. …”
Get full text
Get full text
Get full text
Thesis -
2
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…This research has a high potential of being expanded into cyber threat hunting process in providing a more proactive cybersecurity environment.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
Get full text
Get full text
Thesis -
4
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
5
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
Get full text
Get full text
Thesis -
6
Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications
Published 2024“…Therefore, accurately predicting electricity consumption is crucial for economic management, security analysis, facility scheduling for generation and distribution, and maintenance planning. This study aimed to develop a modified stacked ensemble multivariable Artificial Intelligence (AI)-based predictive algorithm, specifically Stacked Simple Linear Regression and Multiple Linear Regression (SLR-MLR), and Stacked Simple Linear Regression and Multiple Non-Linear Regression (SLR-MNLR) utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science methodology. …”
Get full text
Get full text
Get full text
Article -
7
Intelligent sizing and output prediction techniques for grid-connected photovoltaic system / Shahril Irwan Sulaiman
Published 2012“…Initially, two intuitive-based sizing algorithms for GCPV system design, termed as Conventional Sizing Algorithm (CSA), were developed based on two design goals. …”
Get full text
Get full text
Book Section -
8
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…However the proposed algorithm offers a promising approach to building intelligent systems.…”
Get full text
Get full text
Final Year Project -
9
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…A critical step in developing such intelligent systems is the feature extraction process. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
15
User song preferences using preference learning in artificial intelligence
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Motion estimation in video compression process is computationally intensive for video encoder that involve a large percentage of processing time. …”
Get full text
Get full text
Thesis -
17
Computational dynamic support model for social support assignments around stressed individuals among graduate students
Published 2020“…In the context of social support perspectives, the assigned support may not sufficient or cause a burden to the providers. Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
text::Thesis -
20
