Search Results - (( intelligence based alarm algorithm ) OR ( intelligence based case algorithm ))

Refine Results
  1. 1

    A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications by Al-Mohammedawi, Ali Jber Mshkil

    Published 2019
    “…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A new case is retained in the case base for future retrievals. …”
    Conference paper
  12. 12

    A Comparative Study of the Application of Swarm Intelligence in Kruppa-Based Camera Auto-Calibration by Jaafar, Hazriq Izzuan

    Published 2013
    “…The fitness function used in the camera calibration problem is based on the Kruppa’s equation. A case study from a dataset provided by Le2i Universite de Bourgoune is taken for benchmarking the performance of both algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  14. 14

    Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation by Anwar, Farhat, Boby, Rounaqul Islam, Rashid, Muhammad Mahbubur, Alam, Md. Monjurul, Shaikh, Z.

    Published 2017
    “…An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    A Comparative Study of the Application of Swarm Intelligence in Kruppa-Based Camera Auto-Calibration by Jaafar, Hazriq Izzuan

    Published 2013
    “…The fitness function used in the camera calibration problem is based on the Kruppa’s equation. A case study from a dataset provided by Le2i Universite de Bourgoune is taken for benchmarking the performance of both algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2026
    “…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20