Search Results - (( intelligence based growth algorithm ) OR ( intelligence _ protocol algorithm ))
Search alternatives:
- intelligence based »
- protocol algorithm »
- growth algorithm »
- based growth »
-
1
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
2
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
4
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects:Article -
8
A conceptual automated negotiation model for decision making in the construction domain
Published 2023“…Artificial intelligence; Automation; Autonomous agents; Decision making; Distributed computer systems; Intelligent agents; Multi agent systems; Network architecture; Automated negotiations; Conflict resolution algorithms; Decision making process; Intelligent software agent; Multiagent negotiation; Negotiation algorithm; Negotiation protocol; Value management; Software agents…”
Conference Paper -
9
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
10
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
11
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
12
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Geographical and maximum distance on-demand routing algorithm G-MDORA
Published 2024“…In this paper, we propose geographical and maximum distance on-demand routing algorithm (G-MDORA) that combines the advantages of geographic routing protocol (GRP) and MDORA protocol for Ad hoc routing between vehicle to vehicle (V2V). …”
Article -
15
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Then, the potential of SDN-based VANET is explored from the aspect of routing and the design requirements of routing protocols in SDVNs. SDVN routing algorithms are uniquely classified according to various criteria. …”
Article -
16
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
17
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
18
A collaborated genetic with lion optimization algorithms for improving the quality of forwarding in a vehicular ad-hoc network
Published 2023“…To solve the difficulties especially to control the congestion this paper introduces an enhanced genetic algorithmbased lion optimization for QoF-based routing protocol (EGA-LOQRP) in the VANET network. Lion optimization routing protocol (LORP) is an optimization-based routing protocol that can able to control the network with a huge number of vehicles. …”
Get full text
Get full text
Get full text
Article -
19
-
20
A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence
Published 2013“…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
Get full text
Get full text
Get full text
Article
