Search Results - (( intelligence ai tree algorithm ) OR ( intelligence _ protocol algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…Fortunately, Artificial Intelligence (AI) has recently attracted a lot of attention, and it is now a principal component of these systems. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Prescription: Issue No. 7 (July 2024) by UiTM, Faculty of Pharmacy

    Published 2024
    “…ML, a branch of artificial intelligence (AI), uses algorithms such as neural networks, decision trees, and support vector machines to learn from large datasets and make predictions. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Revolutionising pharmacy through machine learning: the progress and perils / Yuslina Zakaria by Zakaria, Yuslina

    Published 2024
    “…ML, a branch of artificial intelligence (AI), uses algorithms such as neural networks, decision trees, and support vector machines to learn from large datasets and make predictions. …”
    Get full text
    Get full text
    Article
  14. 14

    An efficient and effective case classification method based on slicing by Shiba, Omar A. A., Sulaiman, Md. Nasir, Mamat, Ali, Ahmad, Fatimah

    Published 2006
    “…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Modelling and optimization of microhardness of electroless Ni-P-TiO2composite coating based on machine learning approaches and RSM by Shozib, I.A., Ahmad, A., Rahaman, M.S.A., Abdul-Rani, A.M., Alam, M.A., Beheshti, M., Taufiqurrahman, I.

    Published 2021
    “…The four AI models applied in this study were Support Vector Machine (SVM), Artificial Neural Network (ANN), Random Forest (RF) and Extra Trees (ET). …”
    Get full text
    Get full text
    Article
  16. 16

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18

    A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation by Mohd Ali, Nursabillilah, Besar, Rosli, Ab Aziz, Nor Azlina

    Published 2023
    “…Machine learning is a subfield of artificial intelligence (AI) and computer science that uses data and algorithms to mimic how humans learn, and gradually improving its accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article