Search Results - (( development things selection algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…The Chi Square was used to select the most significant permissions, then the classification algorithms like Naïve Bayes and Decision Tree were used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. …”
    Get full text
    Get full text
    Article
  8. 8

    Systematic review of intrusion detection system based on machine learning techniques for internet of things by Idris, Muhammad, Md Yasin, Sharifah, Audi, Giade Hamza

    Published 2023
    “…The Internet of Things (IoT) has become an integral part of modern society, contributing to the intelligent development of various domains. …”
    Get full text
    Get full text
    Article
  9. 9

    Design and development of smart parking system based on fog computing and internet of things by Balfaqih, M., Jabbar, W., Khayyat, M., Hassan, R.

    Published 2021
    “…Moreover, the parking‐spot selection process considers criteria that do not maximize parking utilization and revenue. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks by A. A Aziz, Azrina, Sekercioglu, Y. Ahmet, Fitzpatrick, Paul, Ivanovich, Milosh

    Published 2013
    “…Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. …”
    Get full text
    Get full text
    Citation Index Journal
  11. 11
  12. 12
  13. 13

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimal reactive power dispatch using multistage artificial immune system by Nordin N.F., Mansor M.H., Kamil K., Roslan N.

    Published 2023
    “…Non-convex, non-linear, and multimodal problems make the development of intelligent algorithms to solve the reactive power dispatch problem highly relevant. …”
    Article
  17. 17
  18. 18
  19. 19

    Metocean Big Data Processing Using Hadoop by Md Yusof, Nadiatul Akmal

    Published 2015
    “…The literature review part will explain the definition of NoSQL and RDBMS, Hadoop Mapreduce and big data, things to do when selecting database, NoSQL database deployments, scenarios for using Hadoop and Hadoop real world example. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article