Search Results - (( intelligence based learning algorithm ) OR ( intelligence based web algorithm ))

Refine Results
  1. 1

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm by Ibrahim, Hamidah, Yasin, Waheed, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura

    Published 2014
    “…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid Intelligent Warning System for Boiler tube Leak Trips by Singh, D., Ismail, F.B., Shakir Nasif, M.

    Published 2017
    “…The Extreme Learning Machine (ELM) methodology was also adopted in IWS-1 and compared with traditional training algorithms. …”
    Get full text
    Get full text
    Article
  6. 6

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Applications of contemporary artificial intelligence technology in forensic odontology as primary forensic identifier : A scoping review by Norhasmira, Mohammad, Rohana, Ahmad, Arofi, Kurniawan, Mohd Yusmiaidil, Putera Mohd Yusof

    Published 2022
    “…Objective: This article aims to evaluate current artificial intelligence applications and discuss their performance concerning the algorithm architecture used in forensic odontology. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A machine learning approach to movie recommendation system by Saw, Zi Jin

    Published 2025
    “…This project presents a machine learning-based movie recommendation system aimed at providing accurate and personalized movie suggestions while addressing common industry challenges such as biased recommendations, data sparsity, and the cold start problem. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  17. 17

    Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review by Kauthar, Mohd Daud, Ananda, Ridho, Suhaila, Zainudin, Chan, Weng Howe, Moorthy, Kohbalan, Nurul Izrin, Md Saleh

    Published 2023
    “…This review paper summarizes research on the hybrid of constraint-based models and machine learning algorithms in optimizing valuable metabolites. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The exploration of hybrid metaheuristics-based approaches: A bibliometric analysis by Nur Hidayah, Azmidi, Noryanti, Muhammad, Rozieana, Khairuddin

    Published 2025
    “…The rapid evolution of computational intelligence has driven significant interest in hybrid metaheuristics, which combine multiple optimization algorithms to solve complicated problems more efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article