Search Results - (( intelligence using computer algorithm ) OR ( intelligence based learning algorithm ))

Refine Results
  1. 1

    Developing an intelligent system to acquire meeting knowledge in problem-based learning environments by Chiang, A., Baba, M.S.

    Published 2006
    “…MALESAbrain1-3 is an intelligent algorithm which originally is designed for problem-based learning (PBL) environment. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2026
    “…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…Fuzzy arithmetic operations on fuzzy numbers and artificial neural networks with a back-propagation learning algorithm were used to represent the structure of the neuro-fuzzy risk assessment model, whereas genetic algorithms were used to develop the safe path selection model. …”
    thesis::doctoral thesis
  7. 7

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Firefly algorithm outperformed the other metaheuristic algorithms used to solve this proposed hybrid artificial intelligence model regarding parameter sensitivity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…In addition, the computational and memory cost of the machine learning is mainly affected by the size of the used datasets. …”
    Get full text
    Get full text
    Article
  9. 9

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The adjustment improves the balance between exploration and exploitation phases, which enhances control accuracy. The MSEDA was used to tune the brain emotional learning-based intelligent controller (BELBIC) together with a proportional-integral-derivative (PID) controller. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The adjustment improves the balance between exploration and exploitation phases, which enhances control accuracy. The MSEDA was used to tune the brain emotional learning-based intelligent controller (BELBIC) together with a proportional-integral-derivative (PID) controller. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…Recently, deep learning methods have significantly sharpened the cutting edge of learning algorithms in a wide range of artificial intelligence tasks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal