Search Results - intelligence based access algorithm*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  11. 11
  12. 12
  13. 13

    Towards designing a high intelligibility rule based standard malay text-to-speech synthesis system by Ahmad, Zakiah Hanim, Khalifa, Othman Omran

    Published 2008
    “…An intelligible and adequately natural sounding formant-based speech synthesis system with a light and user-friendly Graphical User Interface (GUI) was developed. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15
  16. 16

    Assessing Malaysian University English Test (MUET) Essay on Language and Semantic Features Using Intelligent Essay Grader (IEG) by Wong, Wee Sian, Bong, Chih How

    Published 2021
    “…The AES products tend to score essays based on the scoring rubrics of a particular English text context (e.g., TOEFL, GMAT) by employing their proprietary scoring algorithm that is not accessible by the users. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Developing an intelligent user manager system for controlling smart school network resources by Gani, Abdullah, Mouratidis, H., Abouzakhar, N.S., Manson, G.A.

    Published 2002
    “…This paper presents an Intelligent User Manager System (UMAS) for controlling access to network resources in a Smart School network. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…Disconnection of the mobile terminal (MT) from the access points (AP) in WLAN-based systems is the example case of the problem. …”
    Get full text
    Get full text
    Thesis
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis