Search Results - (( intelligence based robust algorithm ) OR ( intelligence based aims algorithm ))

Refine Results
  1. 1
  2. 2

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…It is proposed and shown that route-like intelligent motion is based on a combination of decisional and kinematical factors. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.] by Mohd Isa, Asrul Amin, Hasnan, Aimuni Aina, Hashim, Zuyyin, Othman, Jamal

    Published 2023
    “…The self-driving car is a type of autonomous vehicle that can drive autonomously based on Artificial Intelligence (AI). It is based on the use of sensors, actuators, sophisticated algorithms, machine learning systems, and robust processors. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Hub Angle Control for A Single Link Flexible Manipulator Based on Cuckoo Search Algorithm by aiman Azrael, Shaiful Nahar Sukri, Siti Sarah Zahidah, Nazri, Muhamad Sukri, Hadi, Annisa, Jamali, Hanim, Mohd Yatim, Intan Zaurah, Mat Darus

    Published 2021
    “…System identification was implemented via swarm intelligence algorithm known as cuckoo search algorithms based on auto regressive with exogenous model structure. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5
  6. 6

    An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles by Muhammad Qasim, Khan, Musse Mohamud, Ahmed, Ahmed Mohamed, Ahmed Haidar

    Published 2022
    “…Modern power system requires advanced and intelligent sensors-based protection such as a Phasor Measurement Unit that can provide faster, accurate, and real-time data acquisition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A speech enhancement framework using discrete Krawtchouk-Tchebichef Transform by Mahmmod, Basheera M.

    Published 2018
    “…Speech signals encounter different scenarios during transmission, such as interference and additive noise, which lead to generate noisy signals. Therefore, robust Speech Enhancement Algorithms (SEA) that suppress noise without distorting the original signals are necessary. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Human face detection from color images: preliminary result by Chuan, T. S., Setan, Halim, Majid, Zulkepli

    Published 2004
    “…Images containing faces are essential to intelligent vision-based human computer interaction where it is utilized in various applications (e.g. face recognition, face tracking, pose estimation, expression estimation, etc). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…The intrusion detection component will utilize a combination of signature-based and anomaly-based detection techniques. Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy by Prakas Gopal , Samy

    Published 2024
    “…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Feature extraction and supervised learning for volatile organic compounds gas recognition by Mohd Tombel, Nor Syahira, Mohd Zaki, Hasan Firdaus, Mohd Fadglullah, Hanna Farihin

    Published 2023
    “…However, the identification of the most informative and discriminating features from VOC sensor arrays remains an unresolved challenge, essential for achieving robust VOC class recognition. This research project aims to investigate effective feature extraction techniques that can be employed as discriminative features for machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…This thesis aimed to investigate and develop a novel parameterized architecture design for SENSE algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Survey on encode biometric data for transmission in wireless communication networks by Ali M.H., Ibrahim A., Wahbah H., Al_Barazanchi I.

    Published 2023
    “…Therefore, we present several algorithms and its implementation which addresses this problem by finding a network topology and channel assignment that minimizes interference and thus allows a deployment to increase its throughput performance by utilizing more bandwidth in the local spectrum by reducing coverage as well as connectivity issues in multiple AI-based techniques. …”
    Article
  19. 19
  20. 20