Search Results - (( intelligence based banking algorithm ) OR ( intelligence a process algorithm ))

Refine Results
  1. 1
  2. 2

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…When an energy bank is limited and an energy supply to a system is needed for a specific time, the priority algorithm is frequently used. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan, Matiullah, Zainal, Zainab, Baharom, Md Nor Ramdon, Khalil, Ihsan Ullah, Mohd Ariffin, Azrul, Mohd Jamil, Nor Akmal, Ullah, Irshad, Mehmod, Luqman Hakim, Mohd Yousaf, Mohd Fairouz

    Published 2024
    “…When an energy bank is limited and an energy supply to a system is needed for a specific time, the priority algorithm is frequently used. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Consumption-Based Priority Algorithm for Energy Consumption by Ahsan M., Zainal Z., Baharom M.N.R., Khalil I.U., Ariffin A.M., Jamil N.A.M., Ullah I., Mehmod L.H., Yousaf M.F.M.

    Published 2025
    “…When an energy bank is limited and an energy supply to a system is needed for a specific time, the priority algorithm is frequently used. …”
    Article
  5. 5

    Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning by Lim, Wai Ping, Goh, Ching Pang

    Published 2023
    “…This research explores the application of unsupervised learning, a subset of Artificial Intelligence (AI), to analyze customer behavior in accepting personal loans within the banking sector. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Speaker identification through feature fusion based deep learning / Rashid Jahangir by Rashid , Jahangir

    Published 2021
    “…Speaker identification refers to the process of recognising human voices using artificial intelligence techniques. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone by Md Jamal, Norezmi

    Published 2022
    “…Moreover, the task of removing noises without causing speech distortion is also challenging, in which the quality and intelligibility of speech are affected. In order to overcome these issues, a supervised Deep Neural Network (DNN) algorithm predicted constrained Wiener Filter (cWF) target mask algorithm based on extracted Gammatone filter bank power spectrum (GF-TF) features and trained model is developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-target tracking algorithm in intelligent transportation based on wireless sensor network by Lei, Yang, Wu, Yuan, Khan Chowdhury, Ahmed Jalal

    Published 2018
    “…A multi-target tracking algorithm using wireless sensors in an intelligent transportation system is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…This research has a high potential of being expanded into cyber threat hunting process in providing a more proactive cybersecurity environment.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Real-world optimizations, such as forecasting streamflow, are a complicated process that is highly non-linear and multi-modal, demanding the use of a suitable modeling tool, with an emphasis on artificial intelligence algorithms, to get befitting forecast results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    New algorithm for autonomous dynamic path planning in real-time intelligent robot car by Mohammed, Akeel Ahmed, Hassan, Mohd Khair, Aris, Ishak, Kamsani, Noor Ain

    Published 2017
    “…Through the use of modified A* algorithm, the optimal path with a minimum cost can be determined and an efficient execution time of moving from a starting location to a target location in a dynamic environment can be achieved. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…An Intelligent Learning System for the turning process was developed. …”
    Get full text
    Get full text
    Thesis