Search Results - (( intelligence _ protocols algorithm ) OR ( intelligence big data algorithm ))
Search alternatives:
- protocols algorithm »
- intelligence big »
- data algorithm »
-
1
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…A possible solution is to employ an intelligent middleware that can analyze both the human-generated data and sensory generated data. …”
Get full text
Get full text
Conference or Workshop Item -
2
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…In the era of big data analytic, describing structural pattern in data has been the fore front of many research themes. …”
Get full text
Get full text
Thesis -
3
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
Published 2019“…The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. …”
Get full text
Get full text
Article -
4
A theoretical framework for big data analytics based on computational intelligent algorithms with the potential to reduce energy consumption
Published 2019“…The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
5
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…It has been widely used for its enormous benefits and its ability to cope with large scale data such as workflows and big data applications. …”
Get full text
Get full text
Get full text
Article -
6
Big data analytics and intelligence: A perspective for health care
Published 2023“…There are many techniques and algorithms are available such as PPDM, Machine Learning, Data Mining Algorithms, Artificial Intelligence etc. …”
Article -
7
Investigating the Application of Artificial Intelligence for Earthquake Prediction in Terengganu
Published 2023text::Thesis -
8
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
9
-
10
-
11
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
12
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
13
Novel rule base development from IED-resident big data for protective relay analysis expert system
Published 2016“…This module is to provide the facility of intelligently maintaining the knowledge base of PRAY through the prior discovery of relay operations (association) rules from a novel integrated data mining approach of Rough-Set-Genetic-Algorithm-based rule discovery and Rule Quality Measure. …”
Get full text
Get full text
Book Section -
14
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024Subjects:Article -
15
Towards paddy rice smart farming: a review on big data, machine learning, and rice production tasks
Published 2021“…The quality of data collected from sensors greatly influences the performance of the modelling processes using ML algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
17
The Modern And Digital Transformation Of Oral Health Care: A Mini Review
Published 2024journal::journal article -
18
-
19
Artificial intelligence?powered electrochemical sensor: Recent advances, challenges, and prospects
Published 2025“…Still, they also pose challenges such as data privacy, sensor stability, and algorithmic bias. …”
Review -
20
