Search Results - (( intelligence risk based algorithm ) OR ( intelligence based coding algorithm ))

Refine Results
  1. 1

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modelling of clinical risk groups (CRGs) classification using FAM by Mohd. Asi, Salina, Saad, Puteh

    Published 2006
    “…Some of the material use in this paper is based on research proposal titlcd, "Development Of Clinical Risk Groups Based Intelligent System For Future Prediction Of Health Care Utilization And Resources" by UKM CRGs researchcrs and KUKUM AI Embedded researchers.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of warranty management visualisation for automotive aftermarket with integration of AI by Abdul Hamid, Abdul Hamid, Adull Manan, Nor Fazli, Ismail, Mohd Fauzi, Abdul Wahab, Abdul Malek, Khalit, Muhammad Ilham

    Published 2026
    “…Advanced analytics techniques including Weibull distribution modelling for failure prediction and Python based anomaly detection algorithms were implemented to identify high risk components and unusual claim behaviours. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…The integration of artificial intelligence techniques is becoming necessary for environmental risk assessment systems and decision-making, particularly under the limitations of individual intelligence techniques. …”
    thesis::doctoral thesis
  9. 9
  10. 10
  11. 11

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…In this work active intelligent control comprises a set of control techniques based on particle swarm optimisation (PSO), real coded genetic algorithm (RCGA) and artificial immune system (AIS). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2026
    “…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An Intelligent Voltage Controller for a PV Inverter System Using Simulated Annealing Algorithm-Based PI Tuning Approach by Najeeb, Mushtaq, Muhamad, Mansor, Ramdan, Razali, Hamdan, Daniyal, Ali, Mahmood

    Published 2017
    “…This study associates an intelligent voltage controller based PI approach for PV electrical inverter by employing a meta-heuristic optimization algorithmic called a Simulated Annealing (SA) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…The algorithm requires source codes comparison based on keyword similarity to extract the words that exist in the two related source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19
  20. 20

    Hybrid Intelligent Warning System for Boiler tube Leak Trips by Singh, D., Ismail, F.B., Shakir Nasif, M.

    Published 2017
    “…The first intelligent warning system (IWS-1) represents the use of pure artificial neural network system whereas the second intelligent warning system (IWS-2) represents merging of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
    Get full text
    Get full text
    Article