Where is the intelligence in computational intelligence?
Intelligence is a controversial term to define in a universally acceptable way. However, the term is very frequently used in various fields of computer science like web intelligence, machine intelligence, artificial intelligence and overall in the computational intelligence. Some sort of intelligenc...
| Main Author: | Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/594/ http://irep.iium.edu.my/594/1/intCI2005.pdf |
Similar Items
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Semantic model for artificial intelligence based on molecular computing
by: Tsuboi, Yusei, et al.
Published: (2004)
by: Tsuboi, Yusei, et al.
Published: (2004)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Brute force password search using multithreading and grid computing
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Artificial intelligence and edge computing for machine maintenance-review
by: Bala, Abubakar, et al.
Published: (2024)
by: Bala, Abubakar, et al.
Published: (2024)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Problem-solving method with semantic net based on DNA computing in artificial intelligence
by: Tsuboi, Yusei, et al.
Published: (2004)
by: Tsuboi, Yusei, et al.
Published: (2004)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
CCS516 – Computational Intelligence
(Kecerdasan Komputan)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Development of intelligent 3D solid modeler based on artificial intelligent technique
by: Mohd. Zain, Azlan, et al.
Published: (2008)
by: Mohd. Zain, Azlan, et al.
Published: (2008)
Two objectives big data task scheduling using swarm intelligence in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Prediction Of Petroleum Reservoir Properties Using Nonlinear Feature Selection And Ensembles Of Computational Intelligence Techniques
by: Anifowose, Fatai Adesina
Published: (2015)
by: Anifowose, Fatai Adesina
Published: (2015)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Intelligent light control system (ILIC)
by: Badihah, Ismail
Published: (2016)
by: Badihah, Ismail
Published: (2016)
Word sense disambiguation using hybrid swarm intelligence approach
by: Al-Saiagh, Wafaa, et al.
Published: (2018)
by: Al-Saiagh, Wafaa, et al.
Published: (2018)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Computer vision and artificial intelligence (AI)-based ripeness classification of oil palm fruits in oil palm plantations
by: Chong, Wei Han, et al.
Published: (2025)
by: Chong, Wei Han, et al.
Published: (2025)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
A pragmatic approach of performance evaluation of MPI-OpenMP on a 12 nodes multi-core cluster
by: Abdelgadir , Tageldin, et al.
Published: (2013)
by: Abdelgadir , Tageldin, et al.
Published: (2013)
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
by: Habeebah Adamu , Kakudi
Published: (2019)
by: Habeebah Adamu , Kakudi
Published: (2019)
CCS516 – Computational Intelligence(Kercedasan Komputan) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
A review on job scheduling technique in cloud computing and priority rule based intelligent framework
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Similar Items
-
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015) -
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013) -
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013) -
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014) -
Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)