Search Results - (( intelligence based access algorithm ) OR ( intelligence work computer algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  3. 3
  4. 4

    Assessing Malaysian University English Test (MUET) Essay on Language and Semantic Features Using Intelligent Essay Grader (IEG) by Wong, Wee Sian, Bong, Chih How

    Published 2021
    “…The AES products tend to score essays based on the scoring rubrics of a particular English text context (e.g., TOEFL, GMAT) by employing their proprietary scoring algorithm that is not accessible by the users. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review by AL-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Amir M.

    Published 2024
    “…We identify and review the purpose, achievements, tools/algorithm, and recommendations for each survey work, and thus outline a number of key findings and future directions. …”
    Review
  6. 6

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Systematic review on ai-blockchain based e-healthcare records management systems by Haddad, Alaa, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Hasbullah, Nurul Fadzlin, Zabidi, Suriza Ahmad

    Published 2022
    “…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Old Jawi manuscript: Digital recognition / Zaidi Razak by Zaidi, Razak

    Published 2016
    “…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABC-PSO to select best wireless network during vertical handover process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging by Usmani, U.A., Watada, J., Jaafar, J., Aziz, I.A., Roy, A.

    Published 2021
    “…Semantic segmentation annotation helps train computer vision based Artificial Intelligence models where each image pixel is assigned to a specific object class. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20