Search Results - (( intelligence work computer algorithm ) OR ( intelligence task scheduling algorithm ))

Refine Results
  1. 1

    Two objectives big data task scheduling using swarm intelligence in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke, Islam, Shayla, Zarir, Abdullah Ahmad

    Published 2016
    “…On the other hand, scheduling algorithms; starting from traditional to Hyper-heuristic; are widely used in computing systems such as cloud computing to monitor the use of resources. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing by Alobaedy, Mustafa Muwafak Theab

    Published 2015
    “…The main part of RMS is the scheduler algorithm which has the responsibility to map submitted tasks to available resources. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…We further introduce two intelligent agents to automate the discovery process which are Request Agent (RA) and Description Agent (DA). …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of optimized maintenance scheduling model for coal-fired power plant boiler by Noor Fazreen Binti Ahmad Fuzi, Ms.

    Published 2023
    “…Computing intelligence is a soft-computing subset of artificial intelligence referring to the potential of a computer to gain knowledge from an experimental observations or specific task. …”
    text::Thesis
  12. 12

    A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption by Chiroma, H., Abdullahi, U.A., Hashem, I.A.T., Saadi, Y., Al-Dabbagh, R.D., Ahmad, M.M., Dada, G.E., Danjuma, S., Maitama, J.Z., Abubakar, A., Abdulhamid, S.�M.

    Published 2019
    “…This work highlights that big data analytics using computational intelligent algorithms generates a very high amount of energy, especially during the training phase. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Intelligent dashboard with speech enhancement by Abdul Rahman, Abdul Wahab, Tan, Eng Chong, Abut, Huseyin

    Published 1997
    “…Numerous asynchronous scheduling tasks necessitate the architecture to be re-configurable. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Processing time estimation in precision machining industry using AI / Lim Say Li by Lim, Say Li

    Published 2017
    “…Neural Network (NN) model is chosen as the artificial intelligence approach used in this research. Levenberg-Marquardt algorithm is used as the training algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm by Mohammed, Zahraa Abdulkareem

    Published 2017
    “…This work is aimed to decrease the total real and reactive power losses while enhancing the voltage profile of the distribution network with less computation time by proposing two new artificial intelligence algorithms, i.e. grouping particle swarm optimization algorithm and grouping genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…This work presents an enhanced intelligent intrusion detection model (E2IDS) to detect state of the art known cyberattacks. …”
    Get full text
    Get full text
    Article