Search Results - (( intelligence based web algorithm ) OR ( intelligence based ((e algorithm) OR (new algorithm)) ))

Refine Results
  1. 1

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm by Ibrahim, Hamidah, Yasin, Waheed, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura

    Published 2014
    “…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Designing a New Model for Worm Response Using Security Metrics by Madihah Mohd Saudi, Taib, BM

    Published 2024
    “…Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. …”
    Proceedings Paper
  13. 13
  14. 14
  15. 15

    Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization by Saudi, MM, Abuzaid, AM, Taib, BM, Abdullah, ZH

    Published 2024
    “…Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2 % of true positive rate and with 1.7 % of false positive rate.…”
    Proceedings Paper
  16. 16

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review by AL-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Amir M.

    Published 2024
    “…Furthermore, the review includes a listing of novels and recently used algorithms. Additionally, a critical review of 174 research articles were analyzed as per Web of Science (WoS) and Scopus database. …”
    Review
  20. 20

    Document ranking using information quality criteria in weblog search engine by Azimzadeh, Fatemeh

    Published 2013
    “…Thus, the use of traditional rank algorithms like PageRank and HITS in general search engines are not appropriate to evaluate the Weblog posts because such algorithms do not consider the blog specific features. …”
    Get full text
    Get full text
    Thesis