Search Results - intelligence _ ((process algorithm) OR (protocol algorithm))

Search alternatives:

Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  2. 2

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  3. 3
  4. 4

    Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks by Moghanjoughi, Ayyoub Akbari

    Published 2009
    “…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automated multi-agent negotiation framework for the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M., Idrus A.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Multi agent systems; Software agents; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Proposed architectures; Value management; Intelligent agents…”
    Conference Paper
  6. 6

    A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…This survey is focusing on the stochastic process based power management algorithms for the WSN field. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…Internet of Things aims to automate and add intelligence into existing processes by introducing constrained devices such as sensors and actuators. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis by Akash, Nazmus Sakib, Rouf, Shakir, Jahan, Sigma, Chowdhury, Amlan, Uddin, Jia

    Published 2022
    “…Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
    Get full text
    Get full text
    Article
  10. 10

    Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy by Mukil , Alagirisamy

    Published 2020
    “…Residual energy of POR is 0.26 times higher and PRMTI is 0.14 times higher than the existing protocol. The simulation results of clustering algorithms, INACS and Perceptron framework are validated using various data analysis methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET by JUBAIR, MOHAMMED AHMED, Mostafa, Salama A., ZEBARI, DILOVAN ASAAD, HARIZ, HUSSEIN MUHEE, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, ABBAS, FATIMA HASHIM, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2022
    “…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. …”
    Get full text
    Get full text
    Article
  16. 16

    A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs by JUBAIR, MOHAMMED AHMED, A. MOSTAFA, SALAMA, DZEBARI, DILOVAN ASAAD, MUHEE HARIZ, HUSSEIN, ABDULSATTAR, NEJOOD FAISAL, HASSAN, MUSTAFA HAMID, ABBAS, ALI HASHIM, HASHIM ABBAS, FATIMA, ALASIRY, AREEJ, ALOUANE, M. TURKI-HADJ

    Published 2023
    “…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain by Mohd Hussain, Mohd Najib

    Published 2016
    “…This thesis focussed on the development of PV module integrated with positive output (PO) buck-boost converter by intelligent control of MPPT technique. A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20