Search Results - (( intelligence based bayes algorithm ) OR ( intelligence based protocol algorithm ))

Refine Results
  1. 1

    A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier by Azad, Saiful, Amin Salem, Saleh Bllagdham, Mahmud, Mufti, Kaiser, M. Shamim, Miah, Md Saef Ullah

    Published 2021
    “…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The core of the new protocol is based on the circulation mechanism of the token. …”
    Get full text
    Get full text
    Article
  6. 6

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient and scalable ant colony optimization based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A.

    Published 2020
    “…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  10. 10
  11. 11
  12. 12
  13. 13

    A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision by Mizanur, Rahman, Talha, Sarwar, Ahmed, Zahiduddin, Miah, M. Saef Ullah, Bhowmik, Abhijit, Nusrat, Fahmeda, Junaida, Sulaiman

    Published 2024
    “…Therefore, this article proposes an adaptive system based on the Bayes algorithm for performing medical interventions on patients, leading to a reduction in the dependence on caregivers, particularly in the post-diagnosis scenario.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…Naive Bayes, a probabilistic classifier based on Bayes' theorem, is particularly effective in handling large datasets and making accurate predictions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…The primary objective of this study is to furnish comprehensive information regarding the current SDN-based VANET routing protocols, encompassing intricate details of their underlying mechanisms, forwarding algorithms, and architectural considerations. …”
    Article
  19. 19
  20. 20