Search Results - (( intelligence based non algorithm ) OR ( intelligence based protocol algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments by AL-Obaidi, A.S., Jubair, M.A., Aziz, I.A., Ahmad, M.R., Mostafa, S.A., Mahdin, H., AL-Tickriti, A.T., Hassan, M.H.

    Published 2022
    “…In addition, a clustering algorithm that defines mobility vector and uses Cauchy-based density for enabling adding vehicles to their respective clusters. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…For this purpose, it is proposed to employ an intelligent message routing by implementing Application Oriented Networking (AON) at the routing layer of the systems that are based on DSD architecture. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy by Mukil , Alagirisamy

    Published 2020
    “…Energy-Aware Unequal Clustering routing algorithm with Dual sink (EAUC-DUAL) and Energy based Cluster Head selection Unequal Clustering with Dual sink (ECH-DUAL) are proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Energy efficient cluster head distribution in wireless sensor networks by Siew, Zhan Wei

    Published 2013
    “…The main objective of this research is to improve the cluster based wireless sensor networks lifetime by selecting appropriate cluster head (CH) via improved swarm intelligence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  16. 16

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…Finally, CEC-GP shows a better stability performance compared with "Centre-based Stable Clustering (CBSC)" and "Evolving Data Clustering Algorithm (EDCA)" based on different performance metrics such as the clustering efficiency, the cluster head, and cluster member duration, the cluster head change rate, and the number of created clusters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The core of the new protocol is based on the circulation mechanism of the token. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Evaluation of Security Metric for Artificial Internet of Things Smart Locking System by Siti Nur Hanani, Mohd Rizal

    Published 2023
    “…The primary goal of this dissertation is to evaluate the security metric for IoT based locking system and design an enhance smart locking system that leverages the capabilities of Artificial Intelligence for facial recognition from the ground up. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis