Search Results - (( intelligence system a algorithm ) OR ( intelligence system user algorithm ))*
Search alternatives:
- intelligence system »
- user algorithm »
- a algorithm »
- system user »
- system a »
-
1
Healthy Lifestyle Management System
Published 2011“…The main objective of this system is to develop the intelligent algorithm to calculate the exercise needed by the user based on certain criteria. …”
Get full text
Get full text
Final Year Project -
2
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
3
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
Get full text
Get full text
Get full text
Article -
4
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
Conference paper -
5
-
6
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
8
User song preferences using preference learning in artificial intelligence
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
Get full text
Get full text
Get full text
Article -
10
Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system
Published 2023“…In this paper, an embedded parallel and distributed genetic algorithm (EPDGA) with dynamic parameter setting on a multiprocessor system is proposed. …”
Conference paper -
11
An Intelligent Process Model for Manufacturing System Optimization
Published 2012“…The paper aims to develop an intelligent modeling system using Microsoft Excel spreadsheet interface through mathematical language, mathematical reasoning and algorithms flow chart technique for manufacturing system optimization without human involvement. …”
Get full text
Article -
12
-
13
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
Get full text
Get full text
Article -
14
TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS
Published 2020“…There is no platform that provide event information to tourists. Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
16
A dataglove hardware design and real-time sign gesture interpretation.
Published 2023Conference Paper -
17
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023Subjects: “…Algorithms…”
Conference paper -
18
Maximizing DRL-based energy efficiency in IRS-NOMA using a DDPG algorithm for the next generation of wireless communications
Published 2024“…EE, crucial in Wireless Communications (WCs), measures data transmission relative to energy consumption. This study focuses on a Deep Deterministic Policy Gradient (DDPG) algorithm that intelligently adjusts IRS phase-shift matrices and access point beamforming in NOMA DT. …”
Get full text
Get full text
Get full text
Article -
19
Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz
Published 2024“…The proposed system stands out for its excellent precision, real-time monitoring, and intelligent overload protection. …”
Get full text
Get full text
Student Project -
20
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article
