Search Results - (( intelligence study learning algorithm ) OR ( intelligence system matching algorithm ))

Refine Results
  1. 1

    Energy management strategies, control systems, and artificial intelligence-based algorithms development for hydrogen fuel cell-powered vehicles: A review by Oladosu T.L., Pasupuleti J., Kiong T.S., Koh S.P.J., Yusaf T.

    Published 2025
    “…Therefore, this study presents the prospect of artificial intelligence-based algorithms, control systems, and energy management strategies advances on HFCEVs performance optimization. …”
    Review
  2. 2

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…Machine Learning is a form of Artificial Intelligence that will make systems to think like human being. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The important study in this research is the machine learning with deep learning system to enhance the security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review by Hashim, Suraya, Omar, Muhd Khaizer, Ab. Jalil, Habibah, Mohd Sharef, Nurfadhlina

    Published 2022
    “…The research and practices reported in the study also show how personalized learning was used and factors that made it work, thus the finding of this paper will guide other researchers to recognize various personal traits and the identification of appropriate technology trends and activities for further studies, as well as assist developers in the development of the personalized learning system and closely related to the adaptive learning systems.…”
    Get full text
    Get full text
    Article
  5. 5

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A.

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Anomaly detection for vision-based inspection by Chew, Yan Zhe

    Published 2022
    “…There are two approaches to visual inspection: the conventional approach which uses image processing techniques and the modern AI-based approach through deep learning. This study aims to implement visual inspection systems using both approaches and determine the suitability of each approach for visual anomaly detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A Novel Map-matching Algorithm to Improve Vehicle Tracking System Accuracy by Dewandaru, Agung, Md Said, Abas, Matori, A. N.

    Published 2008
    “…The curve-to-curve matching algorithms measure the similarity between the track and possible road path. …”
    Get full text
    Get full text
    Article
  17. 17

    A novel map-matching algorithm to improve vehicle tracking system accuracy by A.M., Said, A.N., Matori, A., Dewandaru

    Published 2007
    “…Map-matching algorithms attempt to pinpoint the vehicle in a particular road map segment (or any restricting track such as rails, etc), in spite of the digital map errors and navigation system inaccuracies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  19. 19

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Dewandaru, Agung

    Published 2008
    “…Keywords: map-matching, vehicle tracking systems, Multiple Hypotheses Technique, Global Positioning System.…”
    Get full text
    Get full text
    Thesis
  20. 20

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Agung Dewandaru, Agung

    Published 2008
    “…Keywords: map-matching, vehicle tracking systems, Multiple Hypotheses Technique, Global Positioning System.…”
    Get full text
    Get full text
    Final Year Project