Search Results - (( intelligence based process algorithm ) OR ( intelligence service based algorithm ))

Refine Results
  1. 1

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Later, we investigate the game based-FQL algorithm by combining the game theoretic approach and the fuzzy Q-learning algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hidden markov model for decision making among heterogeneous systems in intelligent building by Abba, Babakura

    Published 2014
    “…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The DSMF is an intelligent based system approach to support selective retransmission process and to enhance the performance by means of sensing the network channel conditions and updating the transmission decision. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…The problem is in multi-factor authentication with public cloud computing, the performance of user authentication in password-based authentication needs to move from traditional security processes to intelligent security processes. …”
    text::Thesis
  12. 12

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…In the dynamic market of cloud and heterogeneous environments, the existing system needs an intelligent agent-based negotiation system (IANS) to handle responsibilities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Multi-sources data fusion framework for remote triage prioritization in telehealth by Salman, Omar H., A. Rasid, Mohd Fadlee, Saripan, M. Iqbal, K. Subramaniam, Shamala

    Published 2014
    “…As telemonitoring system consists of three tiers (Sensors/ sources, Base station and Server), the simulation of the MSHA algorithm in the base station is demonstrated in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Ethical concerns about the applications of artificial intelligence in healthcare practices: an explanatory review by Hassan, Ismail Bile, Hashi, Abdurezak Abdulahi

    Published 2021
    “…Artificial intelligence technologies that benefited healthcare include machine learning, natural language processing, rule-based expert system, physical robots, and robotics process automation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing by HAJA NAZMUDEEN, MOHAMED SALEEM

    Published 2012
    “…For this purpose, it is proposed to employ an intelligent message routing by implementing Application Oriented Networking (AON) at the routing layer of the systems that are based on DSD architecture. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING by ABDUL RAHIM, NURALIAH

    Published 2020
    “…Unified customer service known as customer self-service or intelligent facilities refers to the managerial effort to technologies and processes to resolved issues for the customers. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Intelligent deep machine learning cyber phishing URL detection based on BERT features extraction by Muna Elsadig, Ashraf Osman Ibrahim Elsayed, Shakila Basheer, Manal Abdullah Alohali, Sara Alshunaifi, Haya Alqahtani, Nihal Alharbi, Wamda Nagmeldin

    Published 2022
    “…Researchers in cyberspace are motivated to create intelligent models and offer secure services on the web as phishing grows more intelligent and malicious every day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article