Search Results - (( intelligence valid access algorithm ) OR ( intelligence based using algorithm ))

Refine Results
  1. 1
  2. 2

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The second controller design strategy is based on a cost function optimization using GAS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks by Goudarzi, S., Hassan, W.H., Anisi, M.H., Soleymani, S.A., Shabanzadeh, P.

    Published 2015
    “…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Analysis of boiler operational variables prior to tube leakage fault by artificial intelligent system by Al-Kayiem H.H., Al-Naimi F.B.I., Amat W.N.B.W.

    Published 2023
    “…An Intelligent system based on Artificial Neural Network was designed and coded in MATLAB environment. …”
    Conference Paper
  11. 11

    Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models by Huzaini, Muhammad Irfan Darwish, Mansor, Hasmah, Gunawan, Teddy Surya, Ahmad, Izanoordina

    Published 2024
    “…The potential of the proposed AI-based assistant to significantly improve healthcare accessibility and diagnostic accuracy in underserved areas is demonstrated through rigorous testing, which validates its effectiveness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13
  14. 14

    An enhanced minimum variance distortionless response beamformer techniques to reduce interference in array antenna system by Shahab, Suhail Najm

    Published 2017
    “…Metaheuristic optimization algorithms are used widely to solve many engineering problems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The FD idea has previously been used to solve security problems, while military intelligence operations have inspired the TMS and have never been used in WSNs. …”
    Get full text
    Get full text
    Article
  16. 16

    Identifying the correct articulation point of a Quranic letters of the throat (al-halqu) makhraj by Othman, Ahmad Al Baqir, Ahmad, Salmiah, Badron, Khairayu, Altalmas, Tareq M. K.

    Published 2023
    “…This study presents the algorithm design, technique, and simulation of a Speech Recognition-based method to detect the correct articulation point (Makhraj) of the throat letters in the Quranic word. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A comparative study of supervised machine learning approaches for slope failure production by Deris A.M., Solemon B., Omar R.C.

    Published 2023
    “…This study employs an "artificial neural network" (ANN) to predict the slope failures based on historical circular slope cases. Using the feed-forward back-propagation algorithm with a multilayer perceptron network, ANN is a powerful ML method capable of predicting the complex model of slope cases. …”
    Conference Paper
  19. 19

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  20. 20

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper