Search Results - (( intelligence based access algorithm ) OR ( intelligence valid bayes algorithm ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Intelligent guidance parking system using modified Dijkstra's algorithm by Jaafar, Haslina, Zabidi, Muhamad Hidayat, Che Soh, Azura, Thong, Peng Hoong, Shafie, Suhaidi, Ahmad, Siti Anom

    Published 2014
    “…This paper presents the intelligent parking system which apply Dijkstra’s algorithm in finding the shortest path. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. The results indicate that pre-processing steps and dataset characteristics significantly impact algorithm performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhancing fairness and efficiency in teacher placement based on staff placement model: an intelligent teacher placement selection model for Ministry of Education Malaysia by Shamsul Saniron, Zulaiha Ali Othman, Abdul Razak Hamdan

    Published 2025
    “…The effectiveness of ITPS was evaluated using five machine learning algorithms: J48, Decision Tree, Naïve Bayes, Random Forest, and K-Nearest Neighbors. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…In this paper, the optimised Apriori association rule algorithm is used as technical support to realise the function of interlocking fault diagnosis in the intelligent fault diagnosis system module. …”
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Intelligent dynamic bandwidth allocation algorithm in upstream EPONs by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Mustafa I.S., Sadon S.K.

    Published 2023
    “…An upstream access scheme for Ethernet passive optical networks, called the intelligent fuzzy-logic-based dynamic bandwidth allocation algorithm (IFLDBA) has been proposed. …”
    Article
  14. 14
  15. 15
  16. 16

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The Bayesian net- work classi¯ers and the proposed algorithm have been tested using the second set. The studies conducted in this research have shown that Bayesian networks as one of the most successful machine learning classi¯ers for the damage detection in general and the Naijve bayes classi¯er in particular. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis