Search Results - (( intelligence a protocol algorithm ) OR ( intelligence system across algorithm ))
Search alternatives:
- intelligence system »
- protocol algorithm »
- across algorithm »
- intelligence a »
- system across »
- a protocol »
-
1
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
2
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…Digitization has pioneered to drive exceptional changes across all industries in the advancement of analytics, automation, and Artificial Intelligence (AI) and Machine Learning (ML). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…The other way around, AI is a limb of Computer Science dedicated to developing systems that do what a human does intelligently. …”
Get full text
Get full text
Get full text
Article -
4
Decision Support Tools: Machine Learning Application in Smart Planner
Published 2023“…Immaculate Project Planning and Execution (PPE) is capital to edge over competitors, decrease costs and honour delivery dates.Project Management Information System (PMIS) is necessary towards an improved and efficient quality of any project.Machine Learning (ML) Algorithms enabled learned the date of experience to develop insights into various associations between data and outcomes.A defined set of rules prescribed by the analysts makes the probability of the fault possible.In this paper, Regression Model compute across all viable sectors expending the tool for Downstream Business and other Facilities Upstream, including Resource Estimation Schedule Generation.Extending structured information into a reliable database allows super users to define the data structures and completely configurable the settingâ��s dynamics.The model used to decrease the approximation error and measure the closest possible outcome.This subset of artificial intelligence has tremendous potential in improving schedule generation configuration to develop Project Planning timely and financially smartly.This paper aims to share standard protocols and methods applied in ML-aided as a tool in PPE decision making.Additionally, the abundant used data resources devoted to implementing ML are outlined.Finally, ML success as a Decision Support tool in project management by having a Smart Planner in supporting project recommendation accelerates the decision process, increases stakeholder confidence, and minimizes uncertainty; results are reviewed and analyzed where gaps and potential improvement for future projects are being noted and highlighted. …”
Get full text
Get full text
Article -
5
Cohesive token passing algorithm utilizing software agents
Published 2010“…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
Get full text
Get full text
Article -
6
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
7
-
8
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
10
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
11
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
12
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
13
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
14
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
15
Geographical and maximum distance on-demand routing algorithm G-MDORA
Published 2024“…A vehicular ad hoc network (VANET) is an intelligent technology that allows efficient communication, secure data transmission, and traffic management. …”
Article -
16
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
17
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
18
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
19
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…In addition, a complete comparative analysis will be achieved to analyze the protocols regarding performance, optimization, and simulation results. …”
Article -
20
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis
