Search Results - (( intelligence based protocol algorithm ) OR ( intelligence model protocol algorithm ))
Search alternatives:
- intelligence based »
- protocol algorithm »
- intelligence model »
- model protocol »
-
1
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
2
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
3
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
4
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
5
Modeling and simulation of WSNs for agriculture applications using dynamic transmit power control algorithm
Published 2013Get full text
Working Paper -
6
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
7
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2023“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
8
-
9
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
10
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Article -
11
-
12
Cauchy Density-based Algorithm for VANETs Clustering in 3D Road Environments
Published 2022“…The development has included a traffic generation model, mobility model for generating driving behavior, and an algorithm for enabling modeling of road curvature based on an adjacency list that defines the road’s points that define a straight-line segment. …”
Get full text
Get full text
Article -
13
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancing Efficiency and Security of VANETs
Published 2022“…The QoS+ protocol is mainly divided into QoS-based CH selection and hybrid cryptography modules. …”
Get full text
Get full text
Get full text
Article -
14
A smart metering for energy management system via GSM-SMS based protocol
Published 2011“…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article -
16
Cauchy density-based algorithm for VANETs clustering in 3D road environments
Published 2022“…A comparison with selected benchmarks shows the superiority of our model over the benchmarks models in which our model achieves an improvement percentage of 1%, 10%, and 3% for average cluster head duration, average cluster member duration, and clustering efficiency, respectively.…”
Get full text
Get full text
Get full text
Article -
17
Energy efficient cluster head distribution in wireless sensor networks
Published 2013“…The main objective of this research is to improve the cluster based wireless sensor networks lifetime by selecting appropriate cluster head (CH) via improved swarm intelligence. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
