Search Results - intelligence based ((((cloud algorithm) OR (protocol algorithm))) OR (bees algorithm))

Refine Results
  1. 1

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…This paper proposes the operations of the Constrained Device Virtualization Algorithm and then simulates it in CloudSIM to derive performance results. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    ABC-PSO for vertical handover in heterogeneous wireless networks by Goudarzi, Shidrokh, Hassan, Wan Haslina, Anisi, Mohammad Hossein, Soleymani, Seyed Ahmad, Sookhak, Mehdi, Khan, Muhammad Khurram, Hassan Abdalla Hashim, Aisha, Zareei, Mahdi

    Published 2017
    “…This study proposes a hybrid intelligent handover decision algorithm primarily founded on two main heuristic algorithms: Artificial Bee Colony or ABC as well as Particle Swarm Optimization or PSO named ABC-PSO to select best wireless network during vertical handover process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Application of Bee Colony Optimization (BCO) in NP-Hard Problems by Kamarudin, Muhammad Sariy Syazwan

    Published 2011
    “…Bee-Inspired algorithms were presumed to bring the new direction in the field of Swann Intelligence. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Optimal design of step – cone pulley problem using the bees algorithm by Yusof, Noor Jazilah, Kamaruddin, Shafie

    Published 2021
    “…Most of these algorithms were developed based on the collective behavior of social swarms of ants, bees, a flock of birds, and schools of fish. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III by Liu, Jiajia, Zainudin, Edi Syams, As'arry, Azizan, Ismail, Mohd Idris Shah

    Published 2024
    “…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  8. 8

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The core of the new protocol is based on the circulation mechanism of the token. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Local search manoeuvres recruitment in the bees algorithm by Muhamad, Zaidi, Mahmuddin, Massudi, Nasrudin, Mohammad Faidzul, Sahran, Shahnorbanun

    Published 2011
    “…Swarm intelligence of honey bees had motivated many bioinspired based optimisation techniques. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Internet of Things-based Home Automation with Network Mapper and MQTT Protocol by Alam T., Rokonuzzaman M., Sarker S., Abadin A.F.M.Z., Debnath T., Hossain M.I.

    Published 2025
    “…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
    Article
  15. 15
  16. 16

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…It is imperative to consider human different perspective in order to visualize the information data towards users.Many studies proved that personality traits are one of the most significant factors that must be considered to give meaningful value when us ers see a view.This study tries to give ample evidence toward adjusting visual features on tag cloud visualization techniques. Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article