Search Results - (( based services learning algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  2. 2
  3. 3

    A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab by Ab. Wahab, Nazdiana

    Published 2009
    “…This paper showed the integration of VOIP in a simple eLearning prototype system. A network aware based algorithm is used to recommend users the best VOIP services available at that point of time (whether audio, video or data) based on the real time data obtained from bandwidth measurement tool. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa by Mawada Mohamed , Nour El Daim El Khalifa

    Published 2020
    “…This problem has led to low accuracy in predicting Airline Services using Twitter data. Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…Subsequently, DDoS attack detection is performed based on random forest (RF) and decision tree (DT) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…The main objective of this work is to propose and implement an efficient handover decision procedure based on users’ profiles using Q-learning technique in a LTE-A macrocell-femtocell networks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Smart Microgrid QoS and Network Reliability Performance Improvement using Reinforcement Learning by Singh, N., Elamvazuthi, I., Nallagownden, P., Badruddin, N., Ousta, F., Jangra, A.

    Published 2021
    “…This paper proposes a reinforcement learning based methodology, Q-reinforcement Learning based Multi-agent based Bellmanford Routing (QRL-MABR), using multiple agents communicating over the microgrid network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…As a result, legitimate users are barred from utilizing the service from the MPLS network. This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  14. 14

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Applications of Machine Learning in Networking: A Survey of Current Issues and Future Challenges by Ridwan M.A., Radzi N.A.M., Abdullah F., Jalil Y.E.

    Published 2023
    “…Intrusion detection; Machine learning; Quality of service; Complex problems; Computational model; Future challenges; Improve performance; Ml algorithms; Performance issues; Resource management; Rule based algorithms; Complex networks…”
    Article
  17. 17
  18. 18
  19. 19

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article