Search Results - (( intelligence based view algorithm ) OR ( intelligence system new algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- view algorithm »
- new algorithm »
- system new »
-
1
-
2
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004Get full text
Get full text
Book Section -
3
-
4
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…The self-driving car is a type of autonomous vehicle that can drive autonomously based on Artificial Intelligence (AI). It is based on the use of sensors, actuators, sophisticated algorithms, machine learning systems, and robust processors. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Employing Artificial Intelligence to Minimize Internet Fraud
Published 2009“…Today, pre-empting or preventing fraud before it happens occurs in the manual, non-computer based business transactions because of the natural intelligence of both seller and buyer. Currently, even with advances in computing techniques, near human levels of intelligence is not the strength of any computing system, yet techniques are available which may reduce the occurrences of fraud, and are usually referred to as artificial intelligence systems. …”
Get full text
Get full text
Article -
7
-
8
-
9
Design and development of sensor based traffic light system
Published 2006“…The simulation of the algorithm of the traffic signal system was done using MATLAB software. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Advances in lane marking detection algorithms for all-weather conditions
Published 2021“…The review methodology consists of two major areas, which are a review on the general system models employed in the lane marking detection algorithms and a review on the types of weather conditions considered for the algorithms. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff
Published 2016“…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
Get full text
Get full text
Thesis -
14
Design of CF for Automotive Body Parts Based on Artificial Intelligent
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Chaos Search in Fourier Amplitude Sensitivity Test
Published 2012“…Work in Artificial Intelligence (AI) often involves search algorithms. In many complicated problems, however, local search algorithms may fail to converge into global optimization and global search procedures are needed. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Legal Innovation in Religious Courts: The Potential Utilization of Artificial Intelligence (AI) in Resolving Contemporary Cases.
Published 2024“…This study’s academic contribution provides a new perspective on integrating modern technology with Islamic law, particularly within the religious court system. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Farmland fertility optimization for designing of interconnected multi-machine power system stabilizer
Published 2020“…This study describes the process of interconnected multi-machine power system stabilizer (PSS) optimization using a new intelligent technique called farmland fertility algorithm (FFA) to increase the stability of IEEE three machine nine bus power system and offset the low-frequency oscillations (LFOs) during a symmetrical 100 ms three-phase fault at bus 9. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
