Search Results - (( intelligence based based algorithm ) OR ( intelligence basic computer algorithm ))
Search alternatives:
- intelligence based »
- intelligence basic »
- basic computer »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
2
Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman
Published 2020“…On a smaller game map, the algorithm still takes an acceptable computing time but on a larger size map, the computation time suffers a lot. …”
Get full text
Get full text
Thesis -
3
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
4
Research on the construction of English intelligent classroom based on Artificial Intelligence
Published 2018“…Aiming at prompting efficiency and effectiveness of English teaching, establishment of integrated English teaching intelligent classroom based on artificial intelligence is discussed in this paper. …”
Get full text
Get full text
Article -
5
Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim
Published 2021“…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
Get full text
Get full text
Get full text
Article -
6
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…The proposed HPSO algorithm aims to obtain the least number of computations with low degradation value in estimation accuracy. …”
Get full text
Get full text
Thesis -
7
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
8
Local search manoeuvres recruitment in the bees algorithm
Published 2011“…Swarm intelligence of honey bees had motivated many bioinspired based optimisation techniques. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
A novel quasi-oppositional modified Jaya algorithm for multi-objective optimal power flow solution
Published 2018“…An intelligence strategy called quasi-oppositional based learning is incorporated into the proposed algorithm to enhance its convergence property, exploration capability, and solution optimality. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
13
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
14
A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision
Published 2024“…Therefore, this article proposes an adaptive system based on the Bayes algorithm for performing medical interventions on patients, leading to a reduction in the dependence on caregivers, particularly in the post-diagnosis scenario.…”
Get full text
Get full text
Get full text
Article -
15
Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan
Published 2017“…In this research, a system is proposed that utilizes and manages traffic light controllers; more specifically an algorithm is presented which dynamically changes the traffic control system based on the vehicular flow data generated by on-road sensor technology. …”
Get full text
Get full text
Get full text
Thesis -
16
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
17
Application Of The Blockchain Technology Within Healthcare
Published 2021“…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
