Search Results - (( intelligence based maps algorithm ) OR ( intelligence system from algorithm ))*

Refine Results
  1. 1

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Results from the simulated and evaluated algorithm showed that the proposed model was able to achieve a mAP of 97.8 in the daytime dataset and 95.1 in the nighttime dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…Disconnection of the mobile terminal (MT) from the access points (AP) in WLAN-based systems is the example case of the problem. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield. by Md. Sap, Mohd. Noor, Awan, A. Majid

    Published 2005
    “…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
    Get full text
    Get full text
    Article
  5. 5

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…The solar energy collected by the sun-tracking system depends on the accuracy of the sun-tracking algorithm, which is different for each type of sun-tracking system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing by Alobaedy, Mustafa Muwafak Theab

    Published 2015
    “…One of the prominent intelligent algorithms is ant colony system (ACS) which is implemented widely to solve various types of scheduling problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Design of real time intelligent buses notification system for passengers by Muhammad, Rauf

    Published 2012
    “…In this dissertation, a new real time intelligent public transport movement monitoring system and station reporting based on GPS and succession of RF Radio Chips is presented. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Deep-learning-based detection of missing road lane markings using YOLOv5 algorithm by Sophian, Ali, Azmi, Nur Hanisah, Bawono, Ali Aryo

    Published 2021
    “…With the recent technological advancement, especially in machine vision and artificial intelligence, automated or semi-automated missing road lane marking detection systems can potentially be developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    A framework for predicting oil-palm yield from climate data by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2006
    “…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20

    Designing a New Model for Worm Response Using Security Metrics by Madihah Mohd Saudi, Taib, BM

    Published 2024
    “…It is a concept borrowed from human immunology system (HIS), where it has been mapped into network security environment. …”
    Proceedings Paper