Search Results - (( intelligence based process algorithm ) OR ( intelligence service based algorithm ))
Search alternatives:
- intelligence service »
- intelligence based »
- process algorithm »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
8
Hidden markov model for decision making among heterogeneous systems in intelligent building
Published 2014“…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
Get full text
Get full text
Thesis -
9
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The DSMF is an intelligent based system approach to support selective retransmission process and to enhance the performance by means of sensing the network channel conditions and updating the transmission decision. …”
Get full text
Get full text
Thesis -
10
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
11
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
text::Thesis -
12
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
Get full text
Get full text
Conference or Workshop Item -
14
A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud
Published 2010Get full text
Get full text
Conference or Workshop Item -
15
Multi-sources data fusion framework for remote triage prioritization in telehealth
Published 2014“…As telemonitoring system consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the MSHA algorithm in the base station is demonstrated in this paper. …”
Get full text
Get full text
Get full text
Article -
16
Ethical concerns about the applications of artificial intelligence in healthcare practices: an explanatory review
Published 2021“…Artificial intelligence technologies that benefited healthcare include machine learning, natural language processing, rule-based expert system, physical robots, and robotics process automation. …”
Get full text
Get full text
Get full text
Article -
17
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…For this purpose, it is proposed to employ an intelligent message routing by implementing Application Oriented Networking (AON) at the routing layer of the systems that are based on DSD architecture. …”
Get full text
Get full text
Thesis -
18
Feature selection based on particle swarm optimization algorithm for sentiment analysis classification
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…Unified customer service known as customer self-service or intelligent facilities refers to the managerial effort to technologies and processes to resolved issues for the customers. …”
Get full text
Get full text
Final Year Project -
20
Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction
Published 2022“…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
Get full text
Get full text
Get full text
Get full text
Article
