Search Results - intelligence led _ algorithm

Refine Results
  1. 1
  2. 2

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mobile robot path planning using hybrid genetic algorithm and traversability vectors method by Loo, C.K., Rajeswari, M., Wong, E.K., RaoTask, M.V.C.

    Published 2004
    “…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid intelligent approach for network intrusion detection by Al-Mohammed, Wael Hasan Ali

    Published 2015
    “…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Novel genetic algorithm towards implementing a lining-layout optimization strategy. by Md Badarudin, Ismadi, Md Sultan, Abu Bakar, Sulaiman, Md. Nasir, Mamat, Ali, Tengku Muda Mohamed, Mahmud

    Published 2010
    “…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are 1) assigning the determined random values to the genes of chromosome, 2)avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…This led to less complicated and more intelligent equipment has been used on the customer's premises. …”
    Conference paper
  8. 8

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm by Shahrizal, Saat, Mohd Ashraf, Ahmad, Mohd Riduwan, Ghazali

    Published 2025
    “…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Simulated real-time controller for tuning algorithm using modified hill climbing approach by Ahmed, Ahmed Abdulelah

    Published 2014
    “…Often, it is necessary to calibrate a certain parameters of a control system due to plant parameters fluctuation over time.In this research, an intelligent algorithmic tuning technique suitable for realtime system tuning based on hill climbing optimization algorithm and model reference adaptive control system (MRAC) technique is proposed. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…For example, the classical methods for parameter identification (LSE and MLE), the classical methods for LFC (PI, PD and PID) and the intelligent methods (fuzzy logic, neural network, genetic algorithm, and PSO). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article