Search Results - (( intelligence based cloud algorithm ) OR ( intelligence study based algorithm ))*

Refine Results
  1. 1

    Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III by Liu, Jiajia, Zainudin, Edi Syams, As'arry, Azizan, Ismail, Mohd Idris Shah

    Published 2024
    “…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Therefore, the main objective of this study is to develop an algorithm that can adapt visual features of tag cloud layout styles based on personality traits of the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review by AL-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Amir M.

    Published 2024
    “…The role of intelligent based cloud computing is to improve the battery life and manage the battery state of charge (SoC). …”
    Review
  6. 6
  7. 7
  8. 8

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al] by Boudville, Rozan, Abdul Wahab, Afif Luqmanulhakim, Wan Zukenani, Wan Izzat Hakimi, Mohd Khelmy, Muhammad Adly Hisyam, Khiruddin, Nur Raihah

    Published 2025
    “…Headwater phenomena, characterised by rapid increases in river levels and flow velocity, pose significant risks to downstream communities. This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions by Adday, Ghaihab Hassan, K. Subramaniam, Shamala, Ahmad Zukarnain, Zuriati, Samian, Normalia

    Published 2022
    “…The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. …”
    Get full text
    Get full text
    Article
  11. 11

    Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems by Nagrath, Vineet, Morel, Olivier, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Meriaudeau, Fabrice

    Published 2015
    “…HTM5 is an OMG MDA based multi-view metamodel for agent oriented development of cloud robotic systems. …”
    Get full text
    Get full text
    Article
  12. 12

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABC-PSO to select best wireless network during vertical handover process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Predicting crop yield and field energy output for oil palm using genetic algorithm and neural network models by Hilal, Yousif Yakoub

    Published 2019
    “…Data were collected from 11 districts in 11 states in Malaysia for FFB and PO models, which includes Kedah, Kelantan, Johor, Melaka, Penang, Pahang, Perak, Selangor, Terengganu, Sabah, and Sarawak. The study is based on monthly data from 2005 to 2015. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Campus study buddy : collaborative learning and resource sharing app by Huang, Yifan

    Published 2024
    “…The application is developed using Flutter and uses a tag recommendation algorithm to push content that users may be interested in, thereby intelligently providing users with an online learning environment that suits them and improving their learning efficiency. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  17. 17
  18. 18

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  19. 19
  20. 20