Search Results - ((intelligence system) OR (intelligence based)) ((cloud algorithm) OR (rsa algorithm))
Search alternatives:
- intelligence system »
- intelligence based »
- cloud algorithm »
- rsa algorithm »
-
1
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024Subjects: “…Artificial Intelligent Algorithms…”
Article -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III
Published 2024“…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
Get full text
Get full text
Get full text
Article -
4
-
5
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
7
Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review
Published 2024“…This study aims to review the recently published literature on the topic of power management systems and battery charging control. The role of intelligent based cloud computing is to improve the battery life and manage the battery state of charge (SoC). …”
Review -
8
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Privacy in medical emergency system: cryptographic and security aspects
Published 2010Get full text
Get full text
Get full text
Proceeding Paper -
10
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
Get full text
Get full text
Get full text
Article -
11
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…The solar energy collected by the sun-tracking system depends on the accuracy of the sun-tracking algorithm, which is different for each type of sun-tracking system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
13
A Modular Intelligent Control Framework for Scalable Biohydrogen Production in Microbial Electrolysis Cells
Published 2025“…This review traces the evolution of five control paradigms, including voltage/proportional-integral-derivative (PID), model-based, adaptive, fuzzy logic, and artificial-intelligence (AI) systems, as well as hybrid intelligent controllers, and benchmarks each against scalability, dynamic responsiveness, and energy-recovery performance. …”
Get full text
Get full text
Get full text
Article -
14
Peer to peer trade in HTM5 meta model for agent oriented cloud robotic systems
Published 2015“…HTM5 is an OMG MDA based multi-view metamodel for agent oriented development of cloud robotic systems. …”
Get full text
Get full text
Article -
15
Agent driven Peer-to-Peer Cloud Robotics
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Fault tolerance structures in Wireless Sensor Networks (WSNs): survey, classification, and future directions
Published 2022“…The emergence of analytics and the depth of harnessing it has led to the development of new fault-tolerant structures and strategies based on artificial intelligence and cloud-based. …”
Get full text
Get full text
Article -
17
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…The emergence of quantum computing presents both significant opportunities and critical challenges for modern cybersecurity. While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
3D LiDAR Vehicle Perception and Classification Using 3D Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
20
