Search Results - (( intelligence study learning algorithm ) OR ( intelligence system matching algorithm ))
Search alternatives:
- intelligence system »
- intelligence study »
- learning algorithm »
- system matching »
- study learning »
-
1
Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review
Published 2025“…Therefore, this study presents the prospect of artificial intelligence-based algorithms, control systems, and energy management strategies advances on HFCEVs performance optimization. …”
Review -
2
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…Machine Learning is a form of Artificial Intelligence that will make systems to think like human being. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Enhancement of network security by use machine learning
Published 2019“…The important study in this research is the machine learning with deep learning system to enhance the security. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review
Published 2022“…The research and practices reported in the study also show how personalized learning was used and factors that made it work, thus the finding of this paper will guide other researchers to recognize various personal traits and the identification of appropriate technology trends and activities for further studies, as well as assist developers in the development of the personalized learning system and closely related to the adaptive learning systems.…”
Get full text
Get full text
Article -
5
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
9
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
Get full text
Get full text
Get full text
Article -
15
Anomaly detection for vision-based inspection
Published 2022“…There are two approaches to visual inspection: the conventional approach which uses image processing techniques and the modern AI-based approach through deep learning. This study aims to implement visual inspection systems using both approaches and determine the suitability of each approach for visual anomaly detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A Novel Map-matching Algorithm to Improve Vehicle Tracking System Accuracy
Published 2008“…The curve-to-curve matching algorithms measure the similarity between the track and possible road path. …”
Get full text
Get full text
Article -
17
A novel map-matching algorithm to improve vehicle tracking system accuracy
Published 2007“…Map-matching algorithms attempt to pinpoint the vehicle in a particular road map segment (or any restricting track such as rails, etc), in spite of the digital map errors and navigation system inaccuracies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
19
A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy
Published 2008“…Keywords: map-matching, vehicle tracking systems, Multiple Hypotheses Technique, Global Positioning System.…”
Get full text
Get full text
Thesis -
20
A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy
Published 2008“…Keywords: map-matching, vehicle tracking systems, Multiple Hypotheses Technique, Global Positioning System.…”
Get full text
Get full text
Final Year Project
