Search Results - (( intelligence based access algorithm ) OR ( intelligence work computer algorithm ))
Search alternatives:
- intelligence based »
- intelligence work »
- access algorithm »
- work computer »
- based access »
-
1
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
2
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
3
-
4
Assessing Malaysian University English Test (MUET) Essay on Language and Semantic Features Using Intelligent Essay Grader (IEG)
Published 2021“…The AES products tend to score essays based on the scoring rubrics of a particular English text context (e.g., TOEFL, GMAT) by employing their proprietary scoring algorithm that is not accessible by the users. …”
Get full text
Get full text
Get full text
Article -
5
Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review
Published 2024“…We identify and review the purpose, achievements, tools/algorithm, and recommendations for each survey work, and thus outline a number of key findings and future directions. …”
Review -
6
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Finally, the emphasized taxonomy combines blockchain and artificial intelligence, which enables us to analyze possible blockchain and artificial intelligence applications in health records management systems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
13
ABC-PSO for vertical handover in heterogeneous wireless networks
Published 2017“…This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABC-PSO to select best wireless network during vertical handover process. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm
Published 2023Article -
16
A Reinforced Active Learning Algorithm for Semantic Segmentation in Complex Imaging
Published 2021“…Semantic segmentation annotation helps train computer vision based Artificial Intelligence models where each image pixel is assigned to a specific object class. …”
Get full text
Get full text
Article -
17
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis -
18
Simulated Annealing Based Strategy for Test Redundancy Reduction
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
