Search Results - (( intelligence server based algorithm ) OR ( intelligence based learning algorithm ))
Search alternatives:
- intelligence server »
- intelligence based »
- learning algorithm »
- server based »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
2
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…Moreover, cache pollution is a drawback of traditional web caching policies such as Least Frequently Used (LFU), Least Recently Used (LRU), and Greedy Dual Size (GDS) where web objects that are stored in the cache are not visited frequently. In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
4
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
5
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
6
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
7
Implementing server-side federated learning in an edge-cloud framework for precision aquaculture
Published 2025“…In this project, research and literature reviews were conducted to explore the current technologies in smart aquaculture, federated learning, and data privacy. Reviews include systems using IoT and AI-based models, along with analysis of different federated learning algorithms such as FedSGD, FedAvg, and FedProx, and privacypreserving methods such as DA, SA, HE and CKKS encryption. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Thesis -
9
A Neighborhood and Machine Learning-Enabled Information Fusion Approach for the WSNs and Internet of Medical Things
Published 2022“…In this paper, a smart and intelligent neighborhood-enabled data aggregation scheme is presented where every device (cluster head) is bounded to refine the collected data before sending it to the concerned server module. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
12
Real-time personal protective equipment compliance detection using you only look once
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
13
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…For machine learning-based detection, it's important to find important features in a minimal amount of data. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…MALESAbrain1-3 is an intelligent algorithm which originally is designed for problem-based learning (PBL) environment. …”
Get full text
Get full text
Get full text
Article -
15
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
16
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
17
Development of an intelligent prediction tool for rice yield based on machine learning techniques
Published 2006“…Intelligent systems based on machine learning techniques. such as classification. clustering. are gaining Wide spread popularity in real world applications. …”
Get full text
Get full text
Article -
18
-
19
Continuous media (CM) data stream in flash-based solid state disk (SSD) storage server
Published 2019Get full text
Get full text
Conference or Workshop Item -
20
Design of Modeling Elements of Luoshan Shadow Puppets Creative Goods Based on Deep Learning
Published 2023“…Based on the design of modeling elements of Luoshan shadow puppets, this paper analyzes the characteristics of visual elements of shadow puppet creative goods, puts forward an intelligent design algorithm of shadow puppet creative goods based on DL, and explores the computer-aided shadow puppets modeling design strategy driven by artificial intelligence. …”
Get full text
Get full text
Get full text
Proceeding
