Search Results - (( intelligence system _ algorithm ) OR ( intelligence work computer algorithm ))
Search alternatives:
- intelligence system »
- intelligence work »
- work computer »
-
1
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
Get full text
Get full text
Thesis -
2
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
Get full text
Get full text
Article -
3
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
4
An intelligent system based on kernel methods for crop yield prediction
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Designing and Developing an Intelligent Congkak
Published 2011“…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of an intelligent prediction tool for rice yield based on machine learning techniques
Published 2006“…Intelligent systems based on machine learning techniques. such as classification. clustering. are gaining Wide spread popularity in real world applications. …”
Get full text
Get full text
Article -
7
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
Get full text
Get full text
Get full text
Citation Index Journal -
8
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
9
Handbook of Research on Artificial Intelligence Techniques and Algorithms
Published 2014“…Analysts have turned to these problem-solving techniques in the event during natural disasters and chaotic systems research. The Handbook of Research on Artificial Intelligence Techniques and Algorithms highlights the cutting edge developments in this promising research area. …”
Get full text
Get full text
Book -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The applications of computational intelligence in manufacturing, in particular, play a leading role in the technological development of intelligent manufacturing systems. …”
Get full text
Get full text
Thesis -
11
Advanced computational geometry for proximity queries of convex polyhedras
Published 2009Get full text
Working Paper -
12
Automating commercial video game development using computational intelligence
Published 2011“…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
Get full text
Get full text
Get full text
Article -
13
An application of image processing for automated mixed household waste sorting system
Published 2012Get full text
Working Paper -
14
Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield.
Published 2005“…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
Get full text
Get full text
Article -
15
DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS
Published 2011“…The second intelligent monitoring system represents mergmg of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
Get full text
Get full text
Thesis -
16
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
17
Proposed intelligence systems based on digital Forensics : Review paper
Published 2023“…However, most of these intelligence systems are still facing different limitations. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
19
-
20
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023“…Intelligent computing; Intelligent systems; Open source software; Soft computing; Arduino; Dataglove; Gesture; Hardware design; Open-source hardwares; Sign language; Sign Language recognition; SIMPLE algorithm; Open systems…”
Conference Paper
