Search Results - (( intelligence model access algorithm ) OR ( intelligence based process algorithm ))
Search alternatives:
- intelligence model »
- intelligence based »
- process algorithm »
- access algorithm »
- model access »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
2
Adaptable algorithms for performance optimization of dynamic batch manufacturing processes
Published 2018“…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Development of hybrid artificial intelligent based handover decision algorithm
Published 2017“…Hence, in this paper, the development of novel hybrid artificial intelligent handover decision algorithm has been developed. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. Performance of the AVC algorithm is assessed based on parametric design techniques, using RLS and GAS, and non-parametric design techniques, using MLP-NN and ANFIS in the suppression of vibration of the flexible structures. …”
Get full text
Get full text
Get full text
Thesis -
6
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
7
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
Get full text
Get full text
Get full text
Article -
8
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Optimal operation and control of hybrid power systems with stochastic renewables and FACTS devices: An intelligent multi-objective optimization approach
Published 2025“…The application of the recently developed flow direction algorithm, including its multi-objective variant with an �-based constraint-handling mechanism to OPF problem is the primary contributions of this work. …”
Article -
10
A Cryptojacking Detection System With Product Moment Correlation Coefficient (Pmcc) Heatmap Intelligent
Published 2023Get full text
Get full text
Undergraduates Project Papers -
11
Optimization of operating cost and energy consumption in a smart grid
Published 2024“…The non-dominated sorting genetic algorithm II (NSGA-II) is employed to address optimization challenges. …”
Get full text
Get full text
Article -
12
-
13
Towards paddy rice smart farming: a review on big data, machine learning, and rice production tasks
Published 2021“…In this paper, we perform a survey of the latest research on intelligent data processing technology applied in agriculture, particularly in rice production. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
Performance evaluation of Location-Sensitive Handoff using positioning method / Azuwa Ali and Saiful Fadzli Salian
Published 2009“…With the help of location information, handoff process can be optimize and increase the intelligent of radio resource management. …”
Get full text
Get full text
Research Reports -
15
-
16
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
2TSS: Two-tier semantic segmentation framework with enhancement for hotspot detection of solar photovoltaic thermal images
Published 2025“…Recently, intelligence-based hotspot detection has been widely used in solar photovoltaic (PV) image applications. …”
Get full text
Get full text
Get full text
Article -
18
Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj
Published 2023“…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
Get full text
Get full text
Get full text
Article -
19
Agent driven Peer-to-Peer Cloud Robotics
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
20
