Search Results - (( intelligence _ protocol algorithm ) OR ( intelligence valid access algorithm ))
Search alternatives:
- protocol algorithm »
- intelligence valid »
- access algorithm »
- valid access »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
2
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…This work presents a systematic approach for capturing tacit knowledge to be used in a business intelligence framework. The approach is based on the theory of systematic functional linguistics, developed into interview protocols to be asked to tacit knowledge owners. …”
Get full text
Get full text
Thesis -
3
-
4
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
Conference Paper -
6
Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON
Published 2023“…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
Conference paper -
7
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
10
-
11
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper -
12
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
13
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
14
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
15
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
16
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
Get full text
Get full text
Get full text
Article -
17
Geographical and maximum distance on-demand routing algorithm G-MDORA
Published 2024“…In this paper, we propose geographical and maximum distance on-demand routing algorithm (G-MDORA) that combines the advantages of geographic routing protocol (GRP) and MDORA protocol for Ad hoc routing between vehicle to vehicle (V2V). …”
Article -
18
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. …”
Article -
19
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
20
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article
