Search Results - (( intelligence ai protocol algorithm ) OR ( intelligence valid access algorithm ))

Refine Results
  1. 1

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  2. 2
  3. 3
  4. 4

    A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients by Rahman, Md Saidur, Md Nor, Nor Saadah

    Published 2024
    “…The other way around, AI is a limb of Computer Science dedicated to developing systems that do what a human does intelligently. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…Machine learning frameworks have been utilised to facilitate intelligence as operational mechanism in intelligence embedded system such as learning system, prediction protocol and robot navigation system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    eVtols : smart air mobility project / Muhammad Faiz Abu Hassan by Abu Hassan, Muhammad Faiz

    Published 2024
    “…The Smart Ocean Mobility Project represents a groundbreaking initiative at the intersection of cutting-edge patrol boat technology and aerial surveillance, driven by artificial intelligence (AI) algorithms. With a strategic focus on transforming maritime security, this project integrates autonomous patrol boats equipped with advanced sensors, communication systems, and autonomous navigation features. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. …”
    Conference Paper
  11. 11

    A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications by Mohammad Kamrul, Hasan, Musse Mohamud, Ahmed, Aisha, Hassan Abdalla Hashim, Abdur Razzaque, Shayla Islam, Biswajeet, Pandey

    Published 2020
    “…The revolutionary Artificial Intelligence (AI) enables the industrial revolution to provide a significant performance to engineering solutions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced hierarchical dynamic bandwidth allocation algorithm with excess bandwidth and SLA techniques for upstream ethernet PON by Sadon S.Kh., Radzi N.A.M., Din N.M., Mustafa I.S., Al-Mansoori M.H., Yaacob M.

    Published 2023
    “…We show the results of simulations to validate the effectiveness of algorithms presented and to provide quality of service (QoS) for triple play real time services in Ethernet passive optical networks (EPONs). � 2009 IEEE.…”
    Conference paper
  13. 13
  14. 14
  15. 15

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…From the pseudocode of the proposed algorithm, it is observed that the complexity of the algorithm is O(n) which is linear, hence the response time is considered good. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Adaptable algorithms for performance optimization of dynamic batch manufacturing processes by Teo, Kenneth Tze Kin

    Published 2018
    “…Central to precision manufacturing is artificial intelligence as this thesis presents the performance characteristics of tuning-based, rule-based, learning-based and evolutionary-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Enormous intelligent attacks are launched dynamically with the aim of tricking users into thinking they are accessing a reliable website or online application to acquire account information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article