Search Results - (( intelligence system user algorithm ) OR ( intelligence system a algorithm ))

Refine Results
  1. 1

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The main objective of this system is to develop the intelligent algorithm to calculate the exercise needed by the user based on certain criteria. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
    Conference paper
  5. 5
  6. 6

    Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm) by Abd Razak, Nuur Farhani

    Published 2017
    “…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
    Article
  8. 8
  9. 9

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Embedded parallel distributed artificial intelligent processors for adaptive beam forming in WCDMA system by Krishnan P.S., Kiong T.S., Koh J., Yap D.

    Published 2023
    “…In this paper, an embedded parallel and distributed genetic algorithm (EPDGA) with dynamic parameter setting on a multiprocessor system is proposed. …”
    Conference paper
  11. 11

    An Intelligent Process Model for Manufacturing System Optimization by Ho , Kok Hoe, Kanesan , Muthusamy, Harikrishnan , Kanthen

    Published 2012
    “…The paper aims to develop an intelligent modeling system using Microsoft Excel spreadsheet interface through mathematical language, mathematical reasoning and algorithms flow chart technique for manufacturing system optimization without human involvement. …”
    Get full text
    Article
  12. 12
  13. 13

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
    Get full text
    Get full text
    Article
  14. 14

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…There is no platform that provide event information to tourists. Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17
  18. 18

    Maximizing DRL-based energy efficiency in IRS-NOMA using a DDPG algorithm for the next generation of wireless communications by Audah, Kamil, Noordin, Nor K., Hussein, Wala'a, Rasid, Mod Fadlee B. A., Sali, Aduwati, Flah, Aymen

    Published 2024
    “…EE, crucial in Wireless Communications (WCs), measures data transmission relative to energy consumption. This study focuses on a Deep Deterministic Policy Gradient (DDPG) algorithm that intelligently adjusts IRS phase-shift matrices and access point beamforming in NOMA DT. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Advanced current and power consumption monitoring with overload protection / Dinie Haqeemy Abdul Mu'izz by Abdul Mu'izz, Dinie Haqeemy

    Published 2024
    “…The proposed system stands out for its excellent precision, real-time monitoring, and intelligent overload protection. …”
    Get full text
    Get full text
    Student Project
  20. 20

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
    Get full text
    Get full text
    Article