Search Results - (( intelligence system using algorithm ) OR ( intelligence model matching algorithm ))
Search alternatives:
- intelligence system »
- intelligence model »
- using algorithm »
- matching »
-
1
Assignation of PSM evaluator using genetic algorithm
Published 2012“…The purpose of this paper is to present a design of development for Assignation of PSM Evaluator using Genetic Algorithm(APEGA)system.This is an application system that is used to assist the Faculty of Computer System and Software Engineering(FSKKP)of University Malaysia Pahang(UMP)in matching the optimum evaluators for the students in PSM presentation carnival.In the methodology part,a development model which involves with client participation is designed in order to use in the development of this project.The target user of the system is PSM coordinator who is responsible in assigning the PSM evaluator.Assignation of PSM Evaluator using Genetic Algorithm APEGA)is expected to be able in developing a well-distributed matching and overcoming the relevant constraints in an intelligent way. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Image recognition using Artificial Immune systems approach
Published 2009Get full text
Working Paper -
3
-
4
-
5
Model of Bayesian tangent eye shape for eye capture
Published 2014Get full text
Get full text
Conference or Workshop Item -
6
OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
7
OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
9
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
11
Text to Image Generation Using Machine Learning
Published 2024“…Many of the existing algorithms in this field struggle to produce visuals that precisely match the given text. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…RD is about locating an appropriate resource type that match the user’s application requirements. Currently, most Grids RD adopt a centralized or hierarchical model. …”
Get full text
Get full text
Conference or Workshop Item -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Semantic-Based Scalable Decentralized Grid Resource Discovery
Published 2009“…RD is about locating an appropriate resource type that matches the user’s application requirements. Currently most Grid RDs adopt a centralized or hierarchical model. …”
Get full text
Get full text
Conference or Workshop Item
