Search Results - (( intelligence system ((e algorithm) OR (_ algorithm)) ) OR ( intelligence based web algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- web algorithm »
- e algorithm »
- based web »
-
1
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
2
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
4
Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm
Published 2024Proceedings Paper -
5
-
6
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
-
9
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Thesis -
10
Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm
Published 2024“…IWD is a recent metaheuristic population-based algorithm belonging to swarm intelligent category which simulate river system. …”
Proceedings Paper -
11
Hybrid Intelligent Warning System for Boiler tube Leak Trips
Published 2017“…The first intelligent warning system (IWS-1) represents the use of pure artificial neural network system whereas the second intelligent warning system (IWS-2) represents merging of genetic algorithms and artificial neural networks as a hybrid intelligent system. …”
Get full text
Get full text
Article -
12
An intelligent condition monitoring system for fault diagnosis of rotating machinery using expert systems with optimization techniques
Published 2012Subjects: Get full text
Working Paper -
13
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…In the agent-based approach to middleware, the agent’s property such as autonomous, mobile and intelligent are suitable as e-assistance tool for big data management. …”
Get full text
Get full text
Conference or Workshop Item -
14
Advancements in intelligent cloud computing for power optimization and battery management in hybrid renewable energy systems: A comprehensive review
Published 2024“…This study aims to review the recently published literature on the topic of power management systems and battery charging control. The role of intelligent based cloud computing is to improve the battery life and manage the battery state of charge (SoC). …”
Review -
15
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
Get full text
Get full text
Article -
16
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…By inheriting the capabilities of XML SOAP technology and Web Services, three new algorithms based on Event-Condition-Action (ECA) paradigm have been developed to facilitate efficient interoperation of the heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
18
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
19
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
20
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper
