Search Results - (( intelligence system case algorithm ) OR ( intelligence images based algorithm ))

Refine Results
  1. 1
  2. 2

    Dynamic traffic light sequence algorithm using RFID by Al-Khateeb, Khalid A. Saeed, Johari, Jaiz A. Y, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2008
    “…Results: The simulation has shown that, the dynamic sequence algorithm has the ability to intelligently adjust itself even with the presence of some extreme cases. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2016
    “…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Application of Artificial Intelligence In Smart City by Law, Jia Wei

    Published 2021
    “…In the 21st century, it is not a particular case that people employ Artificial Intelligence (AI) in elements around human beings and daily social activities. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Multi-method diagnosis of CT images for rapid detection of intracranial hemorrhages based on deep and hybrid learning by Mohammed, Badiea Abdulkarem, Senan, Ebrahim Mohammed, Al-Mekhlafi, Zeyad Ghaleb, Rassem, Taha Hussein, Makbol, Nasrin M., Alanazi, Adwan Alownie, Almurayziq, Tariq S., Ghaleb, Fuad A., Sallam, Amer A.

    Published 2022
    “…The third proposed system uses artificial neural networks (ANNs) based on the features of the GoogLeNet, ResNet-50 and AlexNet models, whose dimensions are reduced by a principal component analysis (PCA) algorithm, and then the low-dimensional features are combined with the features of the GLCM and LBP algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Brain tumor MRI medical images classification with data augmentation by transfer learning of VGG16 by Ahmed Yahya Al-Galal, Sabaa, Taha Alshaikhli, Imad Fakhri, Abdulrazzaq, M. M., Hassan, Raini

    Published 2021
    “…The ability to estimate conclusions without direct human input in healthcare systems via computer algorithms is known as Artificial intelligence (AI) in healthcare. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…Content-Based Image Retrieval (CBIR) is considered among the most interesting and promising fields as far as image search is concerned. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Traffic Control in a Synchronous Transfer Mode Networks by Khalil, Ibrahim

    Published 1995
    “…Coupled with that the development and deployment of new technologies systems such as fiber optics and intelligent high-speed switches have made it possible to provide these services in future high-speed integrated services networks like Asynchronous Transfer Mode (ATM). …”
    Get full text
    Get full text
    Thesis
  19. 19

    An agent architecture for autonomous UAV flight control in object classification and recognition missions by Mostafa S.A., Mustapha A., Gunasekaran S.S., Ahmad M.S., Mohammed M.A., Parwekar P., Kadry S.

    Published 2024
    “…The agent implements several image handling algorithms to detect and identify objects from their colors and shapes. …”
    Article
  20. 20

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…These two algorithms are compared to their original artificial intelligence algorithms, i.e. particle swarm optimization algorithm and genetic algorithm. …”
    Get full text
    Get full text
    Thesis