Search Results - (( intelligence based shell algorithm ) OR ( intelligence work computer algorithm ))

Refine Results
  1. 1

    A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption by Chiroma, H., Abdullahi, U.A., Hashem, I.A.T., Saadi, Y., Al-Dabbagh, R.D., Ahmad, M.M., Dada, G.E., Danjuma, S., Maitama, J.Z., Abubakar, A., Abdulhamid, S.�M.

    Published 2019
    “…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Two objectives big data task scheduling using swarm intelligence in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke, Islam, Shayla, Zarir, Abdullah Ahmad

    Published 2016
    “…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Intelligent energy allocation strategy for PHEV charging station using gravitational search algorithm by Rahman, Imran, Vasant, Pandian, Mahinder Singh, Balbir Singh, Abdullah-Al-Wadud, M.

    Published 2014
    “…Most of these works require formulation of mathematical models which extensively use computational intelligence-based optimization techniques to solve many technical problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Server scanning worm detection by using intelligent failure connection algorithm by M. Rasheed, Mohammad, Ghazali, Osman, Md. Norwawi, Norita

    Published 2010
    “…The aim of this study is to propose Server Worm Register (SWD) to register the number of computers that are infected by the worm. Our proposal decreases the false alarm in Intelligent Failure Connection Algorithm (IFCA). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Handbook of Research on Artificial Intelligence Techniques and Algorithms by Vasant, P.

    Published 2014
    “…The Handbook of Research on Artificial Intelligence Techniques and Algorithms highlights the cutting edge developments in this promising research area. …”
    Get full text
    Get full text
    Book
  16. 16
  17. 17

    Development of Artificial Intelligent Techniques for Manipulator Position Control by Bani Hashim, Ahmad Yusairi

    Published 2002
    “…This work combines three methods in artificial intelligence: fuzzy rules, neural networks, and genetic algorithm to form the soft computing plant uniquely planned for a six degree-of-freedom serial manipulator. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimization of user comfort index for ambient intelligence using dynamic inertia weight artificial bees colony optimization algorithm by Farah Nur Arina, Baharudin, Nor Azlina, Ab. Aziz, Mohamad Razwan, Abdul Malek, Zuwairie, Ibrahim

    Published 2021
    “…Ambient intelligence (AmI) aims to bring intelligence to human daily lives and making the environment more sensitive and comfortable by applying computational intelligence, sensors and sensors networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal