Search Results - (( intelligence system case algorithm ) OR ( intelligence system caused algorithm ))

Refine Results
  1. 1

    Dynamic traffic light sequence algorithm using RFID by Al-Khateeb, Khalid A. Saeed, Johari, Jaiz A. Y, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2008
    “…Results: The simulation has shown that, the dynamic sequence algorithm has the ability to intelligently adjust itself even with the presence of some extreme cases. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…The difference between the performances of the proposed algorithms and Artificial Immune Recognition System are significant in majority of cases.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Optic cup and optic disc segmentation using improved selfish gene algorithm / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2016
    “…In addition, this new algorithm is compared to color channel multi-thresholding segmentation and artificial intelligence segmentation based clustering method such as Adaptive Neuro-Fuzzy Inference System (ANFIS) and Fuzzy cMeans (FCM). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Novel rule base development from IED-resident big data for protective relay analysis expert system by Othman, Mohammad Lutfi, Aris, Ishak, Ananthapadmanabha, Thammaiah

    Published 2016
    “…Many Expert Systems for intelligent electronic device (IED) performance analyses suchvas those for protective relays have been developed to ascertain operations, maximize availability, and subsequently minimize misoperation risks. …”
    Get full text
    Get full text
    Book Section
  10. 10
  11. 11
  12. 12

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    STPID-Model : A novel approach to Perimeter Intrusion Detection by Pitafi, S., Anwar, T., Sharif, Z., Hina, H.

    Published 2023
    “…In order to solve these problems in perimeter intrusion detection systems (PIDS). In this paper, we proposed a new machine learning-based model named STPID-Model where we used the Imagery library for intelligent detection systems (i-LIDS) dataset, we derived images from the recordings available in i-LIDS dataset and then we applied enhanced algorithm I-DBSCAN for intrusion detection and distinguish between fake and real intrusion. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A speech enhancement framework using discrete Krawtchouk-Tchebichef Transform by Mahmmod, Basheera M.

    Published 2018
    “…The removing of noise without causing speech distortion is a challenging task. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Adaptive approach in handling human inactivity in computer power management by Candrawati, Ria, Hashim, Nor Laily

    Published 2016
    “…Human inactivity is handled by adapting the behavioral changes of the users.Human inactivity refers to as unpredictable workload of a complex system that is caused by increments of amount in power consumption and it can be handled automatically without the need to set a fixed time for changing the computer state.This is happens due to lack of knowledge in a software system and the software self-adaptation is one approach in dealing with this source of uncertainty. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Grey wolf optimization based improved protection of wind power generation systems by Rezaei, Nima, Uddin, Mohammad Nasir, Amin, Ifte Khairul, Othman, Mohammad Lutfi, Zainal Abidin, Izham

    Published 2018
    “…GWO have ample advantages compared to other intelligent algorithms including, fast response, high accuracy and most notably attaining optimal solutions for nonlinear characteristics of OCRs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…During the recent years, development of information technology caused to develop a new industrial system which is called e-Manufacturing system. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks by Abdulla Mogaibel, Hassen Abd-Almotaleb

    Published 2016
    “…To ensure high throughput path, AODV-MRCR uses path optimization as an intelligent mechanism to select a path with least interference and eliminate the intra-flow interference. …”
    Get full text
    Get full text
    Thesis