Search Results - (( intelligence event tree algorithm ) OR ( intelligence agent path algorithm ))
Search alternatives:
- intelligence event »
- intelligence agent »
- tree algorithm »
- path algorithm »
-
1
Implementation of swarm intelligence algorithms on mobile robots
Published 2017“…This thesis focusses on the implementation of swarm intelligence algorithms on multiple mobile robots. A scenario which could be used to display the swarm intelligence behavior is being designed in this thesis. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…This procedure uses ant-like agents to discover optimum and alternative paths. …”
Get full text
Get full text
Thesis -
3
Knowledge discovery in distance relay event report: a comparative data-mining strategy of rough set theory with decision tree
Published 2010“…This paper addresses these issues by intelligently divulging the knowledge hidden in the relay recorded event report using a data-mining strategy based on rough set theory and a rule-quality measure under supervised learning to discover the relay decision algorithm and association rule. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Heuristic factors in ant system algorithm for course timetabling problem
Published 2009Get full text
Get full text
Conference or Workshop Item -
6
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The high prediction accuracy rate and the close-to-unity area under curve (AUC) value of ROC curve of the discovered relay decision algorithm (prediction rules) from the Rough-Set-Theory-and-Genetic-Algorithm data mining verified the algorithm’s generalized ability to predict as well as discriminate future unknown-trip-status relay events. …”
Get full text
Get full text
Thesis -
7
An Intelligent System Approach to the Dynamic Hybrid Robot Control
Published 1996“…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
Get full text
Get full text
Thesis -
8
Dynamic role engine and formation control for cooperating agents
Published 2009Get full text
Working Paper -
9
Routing based multi-agent system for network reliability in the smart microgrid
Published 2020“…The proposed agent-based routing focuses on calculating the shortest path to a given destination to improve network quality and communication reliability. …”
Get full text
Get full text
Article -
10
Framework for mining XML format business process log data
Published 2024“…The effectiveness of the methods and framework was assessed by applying them to both simulation datasets and real-life event logs, namely the Business Process Intelligence Challenge (BPIC). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Proposal for ontology based approach to fuzzy student model design
Published 2014“…Intelligent tutoring system (ITS) is a software system designed using artificial intelligent techniques (comprising of Fuzzy Logic, Neural-Networks, Bayesian networks, Ontology, Genetic Algorithms and Software Agents) to provide an adaptive and personalized tutoring suitable to each individual student based on his/her profile or characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
13
Artificial Intelligence (AI) to predict dental student academic performance based on pre-university results
Published 2022Get full text
Get full text
Proceeding Paper -
14
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…For this issue, this study proposes using intelligent agents to reduce the reachability time in calculating between the nodes and use the naïve approach prune algorithm to remove unnecessary edges, minimizing the attack graph's complexity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Adaptable decentralized orchestration engine for block structured non-transactional workflow in service oriented architecture.
Published 2011“…The latter considers the frequent-path adaptability and both of them together satisfy both frequent-path and proportionalfragment adaptability aspects; v) A Fuzzy Decentralization Decision Making algorithm (FDDM) is presented based on the fuzzy logic to choose a suitable method of decentralization that satisfies the three adaptability aspects frequent-path,proportional- fragment and available-bandwidth; and, vi) an algorithm is introduced for wiring of dynamic fragments. …”
Get full text
Get full text
Thesis -
16
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
17
QoS based fair load-balancing: paradigm to IANRA routing algorithm for wireless networks (WNs)
Published 2008“…In this paper, a new algorithm, Intelligent agent AntNet based Routing Algorithm (IANRA) is proposed to enhance load balancing strategy in Wireless Networks (WNs). …”
Get full text
Get full text
Conference or Workshop Item -
18
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In the benchmarking of the SKF and ssSKF algorithms’ performance in solving the 14-hole PCB drill path optimization case study with recent implementations, on average, both algorithms show the ability to converge to the optimal solution at a smaller number of function evaluations compared to the Gravitational Search Algorithm (GSA), Cuckoo Search (CS), and Intelligent Water Drop (IWD), although fall-short to the Taguchi- Genetic Algorithm optimization algorithm.…”
Get full text
Get full text
Thesis -
19
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…In order to overcome this limitation, this present study recommends the use of intelligent agents to reduce reachability time by calculating between the nodes, as well as using the A*prune algorithm to remove useless edges and reduce attack graph complexity. …”
Get full text
Get full text
Get full text
Article -
20
Evaluation of fall detection classification approaches
Published 2012Get full text
Get full text
Conference or Workshop Item
