Search Results - (( intelligence ai protocol algorithm ) OR ( intelligence based cloud algorithm ))

Refine Results
  1. 1

    Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III by Liu, Jiajia, Zainudin, Edi Syams, As'arry, Azizan, Ismail, Mohd Idris Shah

    Published 2024
    “…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  4. 4

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  8. 8
  9. 9
  10. 10

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…It is imperative to consider human different perspective in order to visualize the information data towards users.Many studies proved that personality traits are one of the most significant factors that must be considered to give meaningful value when us ers see a view.This study tries to give ample evidence toward adjusting visual features on tag cloud visualization techniques. Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review by AL-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Amir M.

    Published 2024
    “…This study aims to review the recently published literature on the topic of power management systems and battery charging control. The role of intelligent based cloud computing is to improve the battery life and manage the battery state of charge (SoC). …”
    Review
  16. 16

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases by Kartinah, Zen, Saju, Mohanan, Seleviawati, Tarmizi, Noralifah, Annuar

    Published 2022
    “…Latency in real-time processing is influenced by many factors such as artificial intelligence (AI) computing algorithm, device processing capabilities, the frameworks, and also the distance from the cloud infrastructure. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  19. 19
  20. 20