Search Results - (( intelligence valid access algorithm ) OR ( intelligence based modeling algorithm ))*

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  2. 2

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…This thesis presents investigations into the development of an intelligent framework for modelling and active vibration control (AVC) of flexible structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks by Goudarzi, S., Hassan, W.H., Anisi, M.H., Soleymani, S.A., Shabanzadeh, P.

    Published 2015
    “…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models by Huzaini, Muhammad Irfan Darwish, Mansor, Hasmah, Gunawan, Teddy Surya, Ahmad, Izanoordina

    Published 2024
    “…This research employs the YOLOv8 model, which is a deep learning algorithm, to determine the most effective methods for detecting skin diseases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj by Othman, Ahmad Al Baqir, Ahmad, Salmiah, Badron, Khairayu, Altalmas, Tareq M. K.

    Published 2023
    “…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A comparative study of supervised machine learning approaches for slope failure production by Deris A.M., Solemon B., Omar R.C.

    Published 2023
    “…The prediction result from testing data was validated based on statistical analysis. The result shows that SVM model has outperformed DT model by giving the prediction accuracy of 97%. ith the advent of technology and the introduction of computational intelligent methods, the prediction of slope failure using the machine learning (ML) approach is rapidly growing for the past few decades. …”
    Conference Paper
  13. 13
  14. 14
  15. 15

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  18. 18

    Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques by Salem S. M. Khalifa

    Published 2024
    “…By contrast, the results of the safe path selection model were compared with the results obtained using Dijkstra's algorithm and the Floyd-Warshall algorithm. …”
    thesis::doctoral thesis
  19. 19

    A decomposed streamflow non-gradientbased artificial intelligence forecasting algorithm with factoring in aleatoric and epistemic variables / Wei Yaxing by Wei , Yaxing

    Published 2024
    “…Firefly algorithm outperformed the other metaheuristic algorithms used to solve this proposed hybrid artificial intelligence model regarding parameter sensitivity. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
    Conference paper