Search Results - (( intelligence based method algorithm ) OR ( intelligence valid access algorithm ))
Search alternatives:
- intelligence based »
- intelligence valid »
- method algorithm »
- access algorithm »
- valid access »
-
1
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
2
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…Dynamic characterisations of one-dimensional flexible beam and two-dimensional flexible plate structures are presented and simulation algorithms characterising the behaviour of each structure is developed using finite difference methods. …”
Get full text
Get full text
Get full text
Thesis -
3
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…The results showed that the proposed method was efficient and valid in detecting phishing websites’ URLs.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
Get full text
Get full text
Get full text
Thesis -
5
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
6
A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks
Published 2015“…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
Get full text
Get full text
Get full text
Article -
7
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Article -
8
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models
Published 2024“…This research employs the YOLOv8 model, which is a deep learning algorithm, to determine the most effective methods for detecting skin diseases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
12
An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system
Published 2017“…The obtained results confirm the complete agreement between MVDR technique and hybrid intelligent swarm PSOGSA algorithm. The proposed MVDRPSOGSA approach can successfully place very sharp nulls (-200 dB deep, on average) at the undesired angles. …”
Get full text
Get full text
Thesis -
13
Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj
Published 2023“…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
Get full text
Get full text
Get full text
Article -
14
A comparative study of supervised machine learning approaches for slope failure production
Published 2023“…Generally, slope failure can be estimated based on traditional methods such as limit equilibrium method (LEM) or finite equilibrium method (FEM). …”
Conference Paper -
15
-
16
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
17
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
Conference Paper -
18
Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON
Published 2023“…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
Conference paper -
19
Solving university examination timetabling problem using intelligent water drops algorithm
Published 2024Subjects: “…Intelligent water drops algorithm…”
Conference Paper -
20
Active intelligent control of vibration of flexible plate structures
Published 2011“…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
Get full text
Get full text
Thesis
