Search Results - (( intelligence based bayes algorithm ) OR ( intelligence _ protocol algorithm ))

Refine Results
  1. 1

    A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier by Azad, Saiful, Amin Salem, Saleh Bllagdham, Mahmud, Mufti, Kaiser, M. Shamim, Miah, Md Saef Ullah

    Published 2021
    “…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision by Mizanur, Rahman, Talha, Sarwar, Ahmed, Zahiduddin, Miah, M. Saef Ullah, Bhowmik, Abhijit, Nusrat, Fahmeda, Junaida, Sulaiman

    Published 2024
    “…Therefore, this article proposes an adaptive system based on the Bayes algorithm for performing medical interventions on patients, leading to a reduction in the dependence on caregivers, particularly in the post-diagnosis scenario.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…Naive Bayes, a probabilistic classifier based on Bayes' theorem, is particularly effective in handling large datasets and making accurate predictions. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The intelligent algorithm ML-ADR fault classifier model could discriminate 10 different far-end short circuit fault types from two network topology changes with and without midpoint integrated STATCOM on the Matlab/Simulink power grid system model. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    A conceptual automated negotiation model for decision making in the construction domain by Mahmoud M.A., Ahmad M.S., Yusoff M.Z.M.

    Published 2023
    “…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
    Conference Paper
  17. 17

    Hidden markov model for decision making among heterogeneous systems in intelligent building by Abba, Babakura

    Published 2014
    “…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network by Rashid, Sami Abduljabbar, Audah, Lukman, Hamdi, Mustafa Maad, Jubair, Mohammed Ahmed, Hassan, Mustafa Hamid, Abood, Mohammed Salah, A. Mostafa, Salama

    Published 2023
    “…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Article