Search Results - (( intelligence based data algorithm ) OR ( intelligence model protocol algorithm ))

Refine Results
  1. 1

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.] by M. A., Hambali, Y. K, Saheed, M. D, Gbolagade, M, Gaddafi

    Published 2017
    “…Researchers then performed data preprocessing on the data. Afterwards, data mining algorithms were applied in order to forecast electric load. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The system design consists of a cellular based power monitoring system using SMS protocol for data transmission. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Multi agent quality of service routing based on scheme ant colony optimization algorithm by Baygi, Maassoumeh Javadi

    Published 2014
    “…The important new aspect of ACR-QoS is the combination of constraint-based routing and DiffServ architecture, in Swarm Intelligence (SI) structure where a set of artificial ants is used to determine the optimal path for each class to construct class-based routing tables. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  13. 13

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15
  16. 16

    A systematic literature review on the application of artificial intelligence in enhancing care for kidney diseases patients by Rahman, Md Saidur, Md Nor, Nor Saadah

    Published 2024
    “…It requires early detection for management. Artificial Intelligence (AI) has emerged as a transformative tool in the management of CKD, enabling more precise diagnosis, treatment optimization, and long-term care. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  20. 20

    Geographical and maximum distance on-demand routing algorithm G-MDORA by Mohammed D., Bin Mansor M., Hock G.C.

    Published 2024
    “…Our proposed model provides an idea that can be used to improve the performance of the GRP and MDORA protocol. …”
    Article