Search Results - intelligence based ((protocol algorithm) OR (((cloud algorithm) OR (learning algorithm))))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  2. 2
  3. 3

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis
  4. 4

    Artificial intelligent integrated into sun-tracking system to enhance the accuracy, reliability and long-term performance in solar energy harnessing by Tan, Jun You

    Published 2022
    “…The proposed AI algorithm integrates two deep learning models which are object detection algorithm and reinforcement learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6
  7. 7

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  8. 8
  9. 9
  10. 10

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…This paper proposes the operations of the Constrained Device Virtualization Algorithm and then simulates it in CloudSIM to derive performance results. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Latency Analysis of Cloud Infrastructure for Time-Critical IoT Use Cases by Kartinah, Zen, Saju, Mohanan, Seleviawati, Tarmizi, Noralifah, Annuar

    Published 2022
    “…Latency in real-time processing is influenced by many factors such as artificial intelligence (AI) computing algorithm, device processing capabilities, the frameworks, and also the distance from the cloud infrastructure. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  14. 14

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The findings also highlighted the diversity of applications in this field such as artificial intelligence and cloud computing, underscoring the relevancy of hybrid metaheuristics. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Implementing server-side federated learning in an edge-cloud framework for precision aquaculture by Ng, Bryan Jing Hong

    Published 2025
    “…In this project, research and literature reviews were conducted to explore the current technologies in smart aquaculture, federated learning, and data privacy. Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…This survey is focusing on the stochastic process based power management algorithms for the WSN field. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20