Search Results - (( intelligence based alarm algorithm ) OR ( intelligence valid path algorithm ))
Search alternatives:
- intelligence based »
- intelligence valid »
- alarm algorithm »
- path algorithm »
- based alarm »
-
1
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
2
Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation
Published 2017“…A shortest path algorithmic was chosen for series of buildings connected by fiber optic network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
thesis::doctoral thesis -
4
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
A novel Bezier curve control point search algorithm for autonomous navigation using N-order polynomial search with boundary conditions
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
Get full text
Get full text
Get full text
Article -
9
Rabies Outbreak Prediction Using Deep Learning with Long Short-Term Memory
Published 2020Get full text
Get full text
Get full text
Book Chapter -
10
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…The results show that the F1 value of the algorithm is about 94%, and the efficiency of the algorithm is high. …”
Get full text
Get full text
Get full text
Proceeding -
11
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
12
Artificial Intelligence Application in Power Generation Industry: Initial considerations
Published 2023Conference Paper -
13
-
14
-
15
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
Get full text
Get full text
Thesis -
16
-
17
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
Get full text
Get full text
Get full text
Article -
18
Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC
Published 2021“…Optimization of tool path operation can lead to a significant reduction in non-productive machining time. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Video surveillance: Item monitoring against theft
Published 2023“…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Distributed planning and control of multirobot formations with navigation and obstacle avoidance
Published 2011Get full text
Get full text
Conference or Workshop Item
