Search Results - (( intelligence based coding algorithm ) OR ( intelligence a protocol algorithm ))
Search alternatives:
- intelligence based »
- protocol algorithm »
- coding algorithm »
- intelligence a »
- based coding »
- a protocol »
-
1
-
2
-
3
A genetic algorithm for management of coding resources in VANET
Published 2017Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…A possible solution is to employ an intelligent middleware that can analyze both the human-generated data and sensory generated data. …”
Get full text
Get full text
Conference or Workshop Item -
6
Machine learning-based enhanced deep packet inspection for IP packet priority classification with differentiated services code point for advance network management
Published 2024“…This study presents an approach to enhance intelligent packet forwarding priority classification on Differentiated Services Code Point (DSCP), leveraging classifiers from machine learning algorithms for Deep Packet Inspection (DPI). …”
Get full text
Get full text
Get full text
Get full text
Article -
7
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The system is constructed from model-based design (MBD) of the PV system. The MBD is divided into four parts; executable system properties, design and simulation of the properties, execution and implementation for code generation and verification process. …”
Get full text
Get full text
Thesis -
8
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
9
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
10
Potential of incorporating evolutionary based network coding for information scavenging in intelligent public transportation
Published 2013“…Genetic algorithm (GA) is introduced to further optimise the resources for network coding by searching optimum transmission route. …”
Get full text
Get full text
Research Report -
11
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
12
-
13
Active intelligent control of vibration of flexible plate structures
Published 2011“…In this work active intelligent control comprises a set of control techniques based on particle swarm optimisation (PSO), real coded genetic algorithm (RCGA) and artificial immune system (AIS). …”
Get full text
Get full text
Thesis -
14
Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications
Published 2026“…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
Get full text
Get full text
Get full text
Book -
15
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
16
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
17
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach
Published 2017“…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
20
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article
