Search Results - (( intelligence model access algorithm ) OR ( intelligence a process algorithm ))

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…This thesis investigates different approaches of integrating hybrid adaptable intelligent algorithms to accommodate the concept of precision optimization via simulated models of industry-scale and pilot-scale. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of hybrid artificial intelligent based handover decision algorithm by Aibinu, Abiodun Musa, Onumanyi, Adeiza J., Adedigba, A. P., Ipinyomi, M., Folorunso, T. A., Salami, Momoh Jimoh Eyiomika

    Published 2017
    “…The underlying factor responsible for this has been traced to the Handover decision module in the Handover process. Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The environment is implemented in such a way that it allows the user to simulate and visualise behaviour of flexible structures with given physical characteristics, to test and validate controller designs, and furthermore, to execute such processes repeatedly in a friendly and easy manner. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis
  7. 7
  8. 8

    Energy-efficient federated learning with resource allocation for green IoT edge intelligence in B5G by Ngah, Razali, Salh, Adeeb, Audah, Lukman, Abdullah, Qazwan, Kim, Kwang Soon, Al-Moliki, Yahya Mohammed Hameed, AlJaloud, Khaled A., Talib, Md Hairul Nizam

    Published 2023
    “…The simulation results indicated that the proposed ADA can adapt the central processing unit frequency and power transmission control to reduce energy consumption at the cost of a small growth of FL time.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Energy-Efficient Federated Learning With Resource Allocation for Green IoT Edge Intelligence in B5G by SALH, ADEB, NGAH, RAZALI, AUDAH, LUKMAN, KWANG SOON KIM, KWANG SOON KIM, ABDULLAH, QAZWAN, M. AL-MOLIKI, YAHYA, A. ALJALOUD, KHALED, TALIB, HAIRUL NIZAM

    Published 2023
    “…The simulation results indicated that the proposed ADA can adapt the central processing unit frequency and power transmission control to reduce energy consumption at the cost of a small growth of FL time.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Energy-Efficient Federated Learning With Resource Allocation for Green IoT Edge Intelligence in B5G by ADEB SALH, ADEB SALH, RAZALI NGAH, RAZALI NGAH, LUKMAN AUDAH, LUKMAN AUDAH, QAZWAN ABDULLAH, QAZWAN ABDULLAH, YAHYA M. AL-MOLIK, YAHYA M. AL-MOLIK, KHALED A. ALJALOUD, KHALED A. ALJALOUD, HAIRUL NIZAM TALIB, HAIRUL NIZAM TALIB

    Published 2023
    “…The simulation results indicated that the proposed ADA can adapt the central processing unit frequency and power transmission control to reduce energy consumption at the cost of a small growth of FL time.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach by Premkumar M., Hashim T.J.T., Ravichandran S., Sin T.C., Chandran R., Alsoud A.R., Jangir P.

    Published 2025
    “…Employing both single- and multi-objective optimization algorithms, the research addresses the OPF problem in a modified IEEE-30 bus system through various case studies. …”
    Article
  19. 19
  20. 20

    Optimization of operating cost and energy consumption in a smart grid by Mahdi, Baqer Saleh, Sulaiman, Nasri, Shehab, Mohanad Abd, Shafie, Suhaidi, Hizam, Hashim, Mohd Hassan, Siti Lailatul

    Published 2024
    “…A decision-making process is implemented to select the optimal solution from the non-dominated alternatives. …”
    Get full text
    Get full text
    Article