Search Results - (( intelligence based malware algorithm ) OR ( intelligence valid path algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
    thesis::doctoral thesis
  5. 5
  6. 6
  7. 7

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  8. 8

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…This research presents a mobile malware static detection method based on Naive Bayes. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning by Taotao, Xu, Musdi, Shanat, Brendan Chan, Kah Le, Wei, Zhang

    Published 2023
    “…The results show that the F1 value of the algorithm is about 94%, and the efficiency of the algorithm is high. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13
  14. 14
  15. 15

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Optimization And Execution Of Multiple Holes-Drilling Operations Based On STEP-NC by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Abedlhafd, Mohammed M.

    Published 2021
    “…Optimization of tool path operation can lead to a significant reduction in non-productive machining time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari by Sattari, Mohammad Reza Jabbarpour

    Published 2015
    “…Previous researches concentrated on using static algorithms to find the shortest path in VTRSs. However, providing a shortest path without considering other factors such as congestion, accidents, obstacles, travel time and speed is not a proper solution for vehicle traffic congestion problem. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Routing based multi-agent system for network reliability in the smart microgrid by Singh, N., Elamvazuthi, I., Nallagownden, P., Ramasamy, G., Jangra, A.

    Published 2020
    “…In this paper, the focus is to enhance the intelligence of microgrid networks using a multi-agent system while validation is carried out using network performance metrics i.e., delay, throughput, jitter, and queuing. …”
    Get full text
    Get full text
    Article