Search Results - (( intelligence system using algorithm ) OR ( intelligence data matching algorithm ))

Refine Results
  1. 1

    A Novel Map-matching Algorithm to Improve Vehicle Tracking System Accuracy by Dewandaru, Agung, Md Said, Abas, Matori, A. N.

    Published 2008
    “…Satellite-based Vehicle Tracking System accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
    Get full text
    Get full text
    Article
  2. 2

    A novel map-matching algorithm to improve vehicle tracking system accuracy by A.M., Said, A.N., Matori, A., Dewandaru

    Published 2007
    “…The satellite-based Vehicle Tracking System accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Dewandaru, Agung

    Published 2008
    “…The satellite-based vehicle tracking systems accuracy can be improved by augmenting the positional information using road network data, in a process known as map-matching. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Map-matching Algorithm to Improve Vehicle Tracking Systems Accuracy by Agung Dewandaru, Agung

    Published 2008
    “…The satellite-based vehicle tracking systems accuracy can be improved by augmenting the positional information using road network data, in a process known as map-niatcliing. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These algorithms identify hidden patterns or data groupings without the assistance of a human. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…The time taken to reach the accuracy is also short with less number of iteration. The ANNDL uses iterations method to detect the data, do matching and identify the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Design of real time intelligent buses notification system for passengers by Muhammad, Rauf

    Published 2012
    “…In order to build the most convenient and reliable system, map matching for location data comparison using optimization technique, Design of Experiment (DOE) is applied. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The work included in this project focuses on developing a system to measure the angular displacement of human joint of lower part with patients having this problem and then applying gait phase detection using intelligent algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Designing an integrated AIOT system for tracking class attendance by Kuak, Xuan Ren

    Published 2024
    “…The system is able to capture the students' real facial feature data, and uses it as a tool to achieve high-accuracy student identification. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review by Hashim, Suraya, Omar, Muhd Khaizer, Ab. Jalil, Habibah, Mohd Sharef, Nurfadhlina

    Published 2022
    “…Personalised learning using AI is an approach that focuses on generating training to match the specific needs of each student such as in adaptive learning, online learning, MOOCs, and many other technologies. …”
    Get full text
    Get full text
    Article
  13. 13

    Text to Image Generation Using Machine Learning by Rishab, Tiwari, Chitra, K.

    Published 2024
    “…One of the usefulness of automatic picture synthesis is the generation of images using conditional generative models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Adaptive and optimized radio resource allocation algorithms for OFDMA based networks by Saadat, Md. Nazmus

    Published 2015
    “…AORAA contains an adaptive and optimized subcarrier allocation algorithm which uses graph theoretic techniques to do the best probable matching of subcarrier and users’ channel information. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A proposed model for text and image encryption using different techniques by Shawkat S.A., Al-Barazanchi I.

    Published 2023
    “…In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. …”
    Article
  16. 16

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. …”
    Get full text
    Get full text
    Get full text
    Article