Search Results - (( intelligence based data algorithm ) OR ( intelligence model protocol algorithm ))
Search alternatives:
- intelligence based »
- intelligence model »
- protocol algorithm »
- data algorithm »
- model protocol »
-
1
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
2
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…Researchers then performed data preprocessing on the data. Afterwards, data mining algorithms were applied in order to forecast electric load. …”
Get full text
Get full text
Get full text
Article -
3
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
Get full text
Get full text
Conference or Workshop Item -
4
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article -
5
-
6
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…The important new aspect of ACR-QoS is the combination of constraint-based routing and DiffServ architecture, in Swarm Intelligence (SI) structure where a set of artificial ants is used to determine the optimal path for each class to construct class-based routing tables. …”
Get full text
Get full text
Thesis -
8
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
9
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
10
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
13
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Get full text
Article -
16
A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients
Published 2024“…It requires early detection for management. Artificial Intelligence (AI) has emerged as a transformative tool in the management of CKD, enabling more precise diagnosis, treatment optimization, and long-term care. …”
Get full text
Get full text
Get full text
Article -
17
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
18
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
19
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
20
Geographical and maximum distance on-demand routing algorithm G-MDORA
Published 2024“…Our proposed model provides an idea that can be used to improve the performance of the GRP and MDORA protocol. …”
Article
