Search Results - (( intelligence based data algorithm ) OR ( intelligence ali ((m algorithm) OR (_ algorithm)) ))
Search alternatives:
- intelligence based »
- intelligence ali »
- data algorithm »
- m algorithm »
-
1
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…The intelligent home research requires understanding of the human behavior and recognizing patterns of activities of daily living (ADL).However instead of understand the psychosomatic nature of human early projects in this area simply employed intelligence to the household appliance.This paper proposed an algorithm for detecting ADL.The proposed method is based on two opposite state entity extraction.The method reflects on the common data flow of smart home event sequence.The developed algorithm clusters the smart home events by isolating opposite status of home appliance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A Novel Hybrid Evolutionary Data-Intelligence Algorithm for Irrigation and Power Production Management: Application to Multi-Purpose Reservoir Systems
Published 2019“…The excellent proficiency of the developed intelligence expert system is the result of the hybrid structure of the BA and PSO algorithm and the substitution of weaker solutions in each algorithm with better solutions from other algorithms. …”
Get full text
Get full text
Article -
3
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…In this study an intelligent learning system was developed to automate the collection of the machining data used by the skilled machinist. …”
Get full text
Get full text
Thesis -
4
A new text-based w-distance metric to find the perfect match between words
Published 2020Get full text
Get full text
Article -
5
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
-
8
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. The K-means is a modified version of the standard K-means by initializing the value K from the value obtained after data mining using Fuzzy-ART and SNC labeling technique. …”
Get full text
Get full text
Get full text
Article -
9
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
10
Conventional and intelligent models for detection and prediction of fluid loss events during drilling operations: a comprehensive review
Published 2020“…These predictive and detecting models comprise of Artificial Intelligence (AI) algorithms that require improvements for data reduction, universal prediction and compatibility. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis
Published 2019“…The role of intelligence techniques is becoming more significant in detecting and diagnosis of medical data. …”
Get full text
Get full text
Get full text
Article -
12
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
13
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
14
Proposed intelligence systems based on digital Forensics : Review paper
Published 2023“…The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on the forensic case studies because of the limitations of traditional methods such as analysis intensive data manually, intelligence visualization to make the evidence more understandable and intelligence system for store data. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Enhancement of filter design and EEG power ratio features in IQ pattern analysis / N. H. R. Azamin ...[et al.]
Published 2017“…Hence, this paper propose an improved extraction algorithm based on the use of high-order equiripple filters. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Efficient transmission based on genetic evolutionary algorithm
Published 2022“…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
19
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
20
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012Get full text
Get full text
Conference or Workshop Item
