Search Results - (( intelligence based data algorithm ) OR ( intelligence based over algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…Performance evaluations based on hit rate and byte hit rate for the new method over conventional methods with real data will be conducted for validation and verification…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Backpropagation neural network based on local search strategy and enhanced multi-objective evolutionary algorithm for breast cancer diagnosis by Ashraf Osman, Ibrahim, Siti Mariyam, Shamsuddin, Abdulrazak, Yahya Saleh, Ahmed, Ali, Mohd Arfian, Ismail, Shahreen, Kasim

    Published 2019
    “…However, the performance of such methods is based on the algorithms or technique. In this paper, we develop an intelligent technique using multiobjective evolutionary method hybrid with a local search approach to enhance the backpropagation neural network. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…Many fields such as data science, data mining suffered from the rapid growth of data volume and high data dimensionality. …”
    Get full text
    Get full text
    Article
  4. 4

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The MSEDA was used to tune the brain emotional learning-based intelligent controller (BELBIC) together with a proportional-integral-derivative (PID) controller. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The MSEDA was used to tune the brain emotional learning-based intelligent controller (BELBIC) together with a proportional-integral-derivative (PID) controller. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An attack proof intelligent digital watermarking based on safe region of fast fourier transform by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A.

    Published 2010
    “…At the moment, the most critical issue faced by the watermarking system is determining the best place to hide watermark data. We propose a method, an attack proof intelligent system, in which Artificial Neural network is use to locate the Safe Region in the host image and the watermark is embedded based on the located Safe Region in Fast Fourier Transform domain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    Development of hybrid artificial intelligent based handover decision algorithm by Aibinu, Abiodun Musa, Onumanyi, Adeiza J., Adedigba, A. P., Ipinyomi, M., Folorunso, T. A., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…The performance of the newly developed k � step ahead ANN based RSS prediction algorithm was evaluated using simulated and real data acquired from available mobile communication networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Using artificial intelligence search in solving the camera placement problem by Altahir, A.A., Asirvadam, V.S., Hamid, N.H.B., Sebastian, P.

    Published 2022
    “…The placement results obtained based on those algorithms are critically compared in terms of the algorithmsâ�� efficiency and performance. …”
    Get full text
    Get full text
    Book
  11. 11
  12. 12
  13. 13

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Evaluation of machine learning algorithms in predicting CO 2 internal corrosion in oil and gas pipelines by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J.

    Published 2019
    “…The empirical solutions also lack intelligence in adapting to different environment. In the absence of a suitable algorithm, the time taken to determine the corrosion occurrence is lengthy as a lot of testing is needed to choose the right solution. …”
    Get full text
    Get full text
    Article
  15. 15

    Evaluation of machine learning algorithms in predicting CO2 internal corrosion in oil and gas pipelines by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J.

    Published 2019
    “…The empirical solutions also lack intelligence in adapting to different environment. In the absence of a suitable algorithm, the time taken to determine the corrosion occurrence is lengthy as a lot of testing is needed to choose the right solution. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    A novel map-matching algorithm to improve vehicle tracking system accuracy by A.M., Said, A.N., Matori, A., Dewandaru

    Published 2007
    “…Point-to-curve matching algorithm is not suitable to the problem since it ignores any historical data and often gave unstable, jumping results. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20