Search Results - (( intelligence system cloud algorithm ) OR ( intelligence ai protocol algorithm ))*
Search alternatives:
- intelligence system »
- protocol algorithm »
- cloud algorithm »
- intelligence ai »
- ai protocol »
-
1
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024Subjects: “…Artificial Intelligent Algorithms…”
Article -
2
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III
Published 2024“…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review
Published 2024“…This study aims to review the recently published literature on the topic of power management systems and battery charging control. The role of intelligent based cloud computing is to improve the battery life and manage the battery state of charge (SoC). …”
Review -
8
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
10
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
13
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
14
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024Proceedings Paper -
15
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…The other way around, AI is a limb of Computer Science dedicated to developing systems that do what a human does intelligently. …”
Get full text
Get full text
Get full text
Article -
17
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…These cloud servers treat robots as any other client computer offering them platform, infrastructure, process or algorithm as a service. …”
Get full text
Get full text
Article -
18
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…The solar energy collected by the sun-tracking system depends on the accuracy of the sun-tracking algorithm, which is different for each type of sun-tracking system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Agent driven Peer-to-Peer Cloud Robotics
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…After using the RANSAC algorithm to remove the map ground, the European clustering algorithm is used for point cloud segmentation. …”
Get full text
Get full text
Get full text
Article
