Search Results - (( intelligence system bas algorithm ) OR ( intelligence based alarm algorithm ))

Refine Results
  1. 1

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A real-time integrated fire detection and alarm (FDA) system for network based building automation by Anwar, Farhat, Islam, Rounakul, Hussain, Sabahat, Rashid, Muhammad Mahbubur, Shaikh, Zuhaib

    Published 2017
    “…The framework shares information through the algorithm and communicates with each fire alarm panels connected in peer to peer configuration to declare the network state in every second using network address. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  7. 7

    Network-based real-time integrated Fire Detection and Alarm (FDA) system with building automation by Anwar, Farhat, Boby, Rounaqul Islam, Rashid, Muhammad Mahbubur, Alam, Md. Monjurul, Shaikh, Z.

    Published 2017
    “…An integrated Fire Detection and Alarm (FDA) systems with building automation was studied, to reduce cost and improve their reliability by preventing false alarm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…The result has shown that this algorithm has increased the detection rate and reduced the false alarm rate compared with Fuzzy-ART.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Video surveillance: Item monitoring against theft by Chong, Yiing Sheah

    Published 2023
    “…All the mentioned counters will be set to 0 if the conditions specified are not met. Based on the predetermined conditions for each type of risk, the appropriate alarms will be activated while a risk occurs. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications by Al-Mohammedawi, Ali Jber Mshkil

    Published 2019
    “…However, most of the algorithms such as artificial intelligence and expert systems need high-end computing systems, which are costly and thus not suitable for normal household utilization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
    Article
  20. 20

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item