Search Results - (( intelligence e learning algorithm ) OR ( intelligence based real algorithm ))
Search alternatives:
- learning algorithm »
- intelligence based »
- intelligence e »
- real algorithm »
- e learning »
- based real »
-
1
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
2
-
3
An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification
Published 2022“…In this study, exhaustive empirical research of the machine learning algorithm for hand posture classification has been established. …”
Get full text
Get full text
Article -
4
Overhead view based person counting using deep learning
Published 2022“…However, the counting accuracy of Centroid Tracking algorithm is about 22.2% lower than the DeepSORT tracking algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
-
7
-
8
-
9
A Constrained Optimization based Extreme Learning Machine for noisy data regression
Published 2023Article -
10
Innovating communication adaptation on social media using AI-based decision support systems
Published 2025“…Leveraging intelligent algorithms, the research investigates mechanisms that enable dynamic analysis and personalized recommendations to improve message clarity, relevance, and impact. …”
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
-
14
Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset
Published 2020“…The novel optimization-based artificial intelligence algorithm proposed in this paper implies an improved way to overcome a real engineering challenge i.e. handling missing values for better RUL prediction, hence bringing great opportunities for the domain area. …”
Get full text
Get full text
Article -
15
-
16
Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices
Published 2024“…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…AI-based systems enhance decision support for clinicians, improving the management of dialysis and post-transplant care by predicting complications and providing real-time insights. …”
Get full text
Get full text
Get full text
Article -
18
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
19
STPID-Model : A novel approach to Perimeter Intrusion Detection
Published 2023“…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
