Search Results - (( intelligence system _ algorithm ) OR ( intelligence work computer algorithm ))

Refine Results
  1. 1

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
    Get full text
    Get full text
    Article
  3. 3

    Two objectives big data task scheduling using swarm intelligence in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke, Islam, Shayla, Zarir, Abdullah Ahmad

    Published 2016
    “…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…This issues can solved by programming the Congkak system based on previous work on Mancala and NN system, and then recording the performance of the related algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an intelligent prediction tool for rice yield based on machine learning techniques by Md. Sap, Mohd. Noor, Awan, A. M.

    Published 2006
    “…Intelligent systems based on machine learning techniques. such as classification. clustering. are gaining Wide spread popularity in real world applications. …”
    Get full text
    Get full text
    Article
  7. 7

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  8. 8
  9. 9

    Handbook of Research on Artificial Intelligence Techniques and Algorithms by Vasant, P.

    Published 2014
    “…Analysts have turned to these problem-solving techniques in the event during natural disasters and chaotic systems research. The Handbook of Research on Artificial Intelligence Techniques and Algorithms highlights the cutting edge developments in this promising research area. …”
    Get full text
    Get full text
    Book
  10. 10

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The applications of computational intelligence in manufacturing, in particular, play a leading role in the technological development of intelligent manufacturing systems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Development of an intelligent system using Kernel-based learning methods for predicting oil-palm yield. by Md. Sap, Mohd. Noor, Awan, A. Majid

    Published 2005
    “…Intelligent systems based on machine learning techniques, such as classification, clustering, are gaining wide spread popularity in real world applications. …”
    Get full text
    Get full text
    Article
  15. 15

    DESIGN AND IMPLEMENTATION OF INTELLIGENT MONITORING SYSTEMS FOR THERMAL POWER PLANT BOILER TRIPS by FIRAS BASIM, ISMAIL ALNAIMI

    Published 2011
    “…The second intelligent monitoring system represents mergmg of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    A dataglove hardware design and real-time sign gesture interpretation. by Neoh D., Mohamed Sahari K.S., Wan Ibrahim W.Z.F.

    Published 2023
    “…Intelligent computing; Intelligent systems; Open source software; Soft computing; Arduino; Dataglove; Gesture; Hardware design; Open-source hardwares; Sign language; Sign Language recognition; SIMPLE algorithm; Open systems…”
    Conference Paper