Search Results - intelligence led _ algorithm
Search alternatives:
-
1
-
2
Intelligent guidance parking system using modified Dijkstra's algorithm
Published 2014“…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
Get full text
Get full text
Get full text
Article -
4
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
Published 2004“…Recent advances in robotics and machine intelligence have led to the application of modern optimization method such as the genetic algorithm (GA), to solve the path-planning problem. …”
Get full text
Get full text
Get full text
Article -
5
Hybrid intelligent approach for network intrusion detection
Published 2015“…Due to the prevailing limitations of finding novel attacks, high false detection, and accuracy in previous intrusion detection approaches, this study has proposed a hybrid intelligent approach for network intrusion detection based on k-means clustering algorithm and support vector machine classification algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Novel genetic algorithm towards implementing a lining-layout optimization strategy.
Published 2010“…Because there are many possible solutions with ambiguous results, a novelty of Genetic Algorithm (GA) for lining-layout with focusing on the two approaches which are 1) assigning the determined random values to the genes of chromosome, 2)avoiding the same solution of optimal blocks occurs, was applied to suggest the optimal solution intelligently. …”
Get full text
Get full text
Article -
7
Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON
Published 2023“…This led to less complicated and more intelligent equipment has been used on the customer's premises. …”
Conference paper -
8
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
9
Data-driven brain emotional learning-based intelligent controller-PID control of MIMO systems based on a modified safe experimentation dynamics algorithm
Published 2025“…The safe experimentation dynamics algorithm (SEDA) is one such method that optimizes controller parameters using data-driven techniques. …”
Get full text
Get full text
Get full text
Article -
10
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Simulated real-time controller for tuning algorithm using modified hill climbing approach
Published 2014“…Often, it is necessary to calibrate a certain parameters of a control system due to plant parameters fluctuation over time.In this research, an intelligent algorithmic tuning technique suitable for realtime system tuning based on hill climbing optimization algorithm and model reference adaptive control system (MRAC) technique is proposed. …”
Get full text
Get full text
Thesis -
12
Optimal DG Placement and Sizing for Voltage Stability Improvement Using Backtracking Search Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
14
Knowledge base processing method based on text classification algorithm
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Reference-free Reduction of Ballistocardiogram Artifact from EEG Data Using EMD-PCA
Published 2014Get full text
Get full text
Conference or Workshop Item -
16
Hybrid intelligent methods for parameter identification and load frequency control in power system
Published 2014“…For example, the classical methods for parameter identification (LSE and MLE), the classical methods for LFC (PI, PD and PID) and the intelligent methods (fuzzy logic, neural network, genetic algorithm, and PSO). …”
Get full text
Get full text
Thesis -
17
A novel high performance routing technique for cross-referencing DMFBs
Published 2012Get full text
Working Paper -
18
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. …”
Get full text
Get full text
Article -
19
Homologous multi-points warping: an algorithm for automatic 3D facial landmark
Published 2019Get full text
Get full text
Conference or Workshop Item -
20
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. …”
Get full text
Get full text
Get full text
Get full text
Article
