Search Results - intelligence valid access algorithm

Refine Results
  1. 1
  2. 2

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  3. 3

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  4. 4

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
    Conference paper
  5. 5
  6. 6

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Novel Model on Curve Fitting and Particle Swarm Optimization for Vertical Handover in Heterogeneous Wireless Networks by Goudarzi, S., Hassan, W.H., Anisi, M.H., Soleymani, S.A., Shabanzadeh, P.

    Published 2015
    “…In addition, we present a novel network selection algorithm to select the best candidate access point among the various access technologies based on the PSO. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…Tacit knowledge becoming a key issue in business intelligence approach to knowledge systems. Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models by Huzaini, Muhammad Irfan Darwish, Mansor, Hasmah, Gunawan, Teddy Surya, Ahmad, Izanoordina

    Published 2024
    “…The potential of the proposed AI-based assistant to significantly improve healthcare accessibility and diagnostic accuracy in underserved areas is demonstrated through rigorous testing, which validates its effectiveness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20