Search Results - intelligence based access algorithm*
Search alternatives:
- intelligence based »
- access algorithm »
- based access »
-
1
-
2
-
3
-
4
WiMAX Traffic Forecasting Based On Artificial Intelligence Techniques
Published 2024thesis::doctoral thesis -
5
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
6
-
7
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
11
-
12
-
13
Towards designing a high intelligibility rule based standard malay text-to-speech synthesis system
Published 2008“…An intelligible and adequately natural sounding formant-based speech synthesis system with a light and user-friendly Graphical User Interface (GUI) was developed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Assessing Malaysian University English Test (MUET) Essay on Language and Semantic Features Using Intelligent Essay Grader (IEG)
Published 2021“…The AES products tend to score essays based on the scoring rubrics of a particular English text context (e.g., TOEFL, GMAT) by employing their proprietary scoring algorithm that is not accessible by the users. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Developing an intelligent user manager system for controlling smart school network resources
Published 2002“…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
Get full text
Get full text
Get full text
Article -
19
A Novel Path Prediction Strategy for Tracking Intelligent Travelers
Published 2009“…Disconnection of the mobile terminal (MT) from the access points (AP) in WLAN-based systems is the example case of the problem. …”
Get full text
Get full text
Thesis -
20
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis
