Search Results - (( intelligence based protocol algorithm ) OR ( intelligence based computer algorithm ))*
Search alternatives:
- intelligence based »
- protocol algorithm »
- based computer »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
2
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…This study proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
Article -
3
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
4
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Due to network complexity, conventional QoS-improving routing algorithms (RAs) may be impractical. Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
6
A Survey of Stochastic processes in Wireless Sensor Network: a Power Management Prospective
Published 2013“…This survey is focusing on the stochastic process based power management algorithms for the WSN field. …”
Get full text
Get full text
Conference or Workshop Item -
7
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
8
Performance analysis of constrained device virtualization algorithm
Published 2020“…We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
Get full text
Get full text
Get full text
Article -
9
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
10
Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network
Published 2016“…Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). …”
Get full text
Get full text
Article -
11
-
12
Performance Analysis of Routing Protocols in Resource-Constrained Opportunistic Networks
Published 2019“…We firstly described these protocols and presented their algorithms. Thereafter, we carried out a comparative study of these protocols using exhaustive performance testing experiments with different numbers of nodes, traffic loads, message lifetime, and buffer size. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
IoT-Based intelligent system for headwater phenomenon detection and alerts using ESP32 / Rozan Boudville … [et al]
Published 2025“…This study presents an Internet of Things (IoT)-based intelligent monitoring and alert system for detecting headwater phenomena in real time. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…In doing this, two ANN algorithms (MLP and RBF) and SMO algorithm were employed and compared. …”
Get full text
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
