Search Results - intelligence _ ((process algorithm) OR (protocol algorithm))
Search alternatives:
- protocol algorithm »
- process algorithm »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
2
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Also the main aim of this research is to solve the freezing problem during optimum as well as sub-optimum path discovery process. In this research, Intelligent AntNet based Routing Algorithm (IANRA) is presented for routing in WMNs and MANET to find optimum and near-optimum paths for data packet routing. …”
Get full text
Get full text
Thesis -
5
Automated multi-agent negotiation framework for the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Multi agent systems; Software agents; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Proposed architectures; Value management; Intelligent agents…”
Conference Paper -
6
A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective
Published 2013“…This survey is focusing on the stochastic process based power management algorithms for the WSN field. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Performance analysis of constrained device virtualization algorithm
Published 2020“…Internet of Things aims to automate and add intelligence into existing processes by introducing constrained devices such as sensors and actuators. …”
Get full text
Get full text
Get full text
Article -
9
Botnet Detection in IoT Devices Using Random Forest Classifier with Independent Component Analysis
Published 2022“…Various machine learning algorithms were also implemented upon the processed data for comparative analysis. …”
Get full text
Get full text
Article -
10
Energy-efficient data transmission with clustering and compressive sensing in wireless sensor networks / Mukil Alagirisamy
Published 2020“…Residual energy of POR is 0.26 times higher and PRMTI is 0.14 times higher than the existing protocol. The simulation results of clustering algorithms, INACS and Perceptron framework are validated using various data analysis methods. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Linking Bayesian Network and Intensive Care Units Data: A Glycemic Control Study
Published 2023Conference Paper -
14
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. …”
Get full text
Get full text
Article -
16
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The CH selection module based on QoS parameters attempts to provide reliable and stable clusters and improve the firmness and connectivity during the communication process of the network. The hybrid cryptography module contains Advanced Encryption Standard (AES) and Elliptic Curve Cryptosystems (ECC) algorithms. …”
Get full text
Get full text
Article -
17
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…This thesis focussed on the development of PV module integrated with positive output (PO) buck-boost converter by intelligent control of MPPT technique. A novel of combination direct and indirect (CoDId) MPPT algorithm is implemented for solving mismatch losses from existing PV system by employing the implementation of system identification approach. …”
Get full text
Get full text
Thesis -
18
-
19
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
