Search Results - intelligence based ((((protocol algorithm) OR (cloud algorithm))) OR (means algorithm))
Search alternatives:
- intelligence based »
- protocol algorithm »
- cloud algorithm »
- means algorithm »
-
1
Tag cloud algorithm with the inclusion of personality traits
Published 2014“…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
Get full text
Get full text
Get full text
Article -
2
-
3
Performance analysis of constrained device virtualization algorithm
Published 2020“…This paper proposes the operations of the Constrained Device Virtualization Algorithm and then simulates it in CloudSIM to derive performance results. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing
Published 2022“…The proposed AI algorithm integrates two deep learning models which are object detection algorithm and reinforcement learning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
Get full text
Get full text
Get full text
Article -
8
Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III
Published 2024“…This research provides valuable insights for the advancement of intelligent cloud-based 4D printing systems, paving the way for future developments in this field.…”
Get full text
Get full text
Get full text
Article -
9
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
Article -
10
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…Furthermore, the algorithm to generate tag cloud visualization based on personality traits has not been explored. …”
Get full text
Get full text
Get full text
Thesis -
11
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
12
-
13
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…In doing this, two ANN algorithms (MLP and RBF) and SMO algorithm were employed and compared. …”
Get full text
Get full text
Get full text
Article -
14
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010Get full text
Get full text
Conference or Workshop Item -
15
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025“…Standard cloud-based IoT systems can't fully function in areas with unstable internet. …”
Article -
16
-
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
18
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
20
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article
