Search Results - (( intelligence system growth algorithm ) OR ( intelligence data modeling algorithm ))

Refine Results
  1. 1

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  2. 2

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  3. 3

    iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems by Azad, Saiful, Mahmud, Mufti, Kamal Zuhairi, Zamli, Kaiser, M. Shamim, Jahan, Sobhana, Razzaque, Md Abdur

    Published 2024
    “…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An intelligent risk management framework for monitoring vehicular engine health by Rahim, Md. Abdur, Rahman, Md. Arafatur, Rahman, Md. Mustafizur, Zaman, Nafees, Moustafa, Nour, Razzak, Imran

    Published 2022
    “…We used machine learning and deep learning algorithms to assess the effectiveness of the risk management system’s decision model. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin by Nordin, Daarin Nadia

    Published 2020
    “…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    A machine learning approach to movie recommendation system by Saw, Zi Jin

    Published 2025
    “…This work demonstrates the potential of intelligent systems to improve user satisfaction in digital media platforms.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed,, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Majeed Alhammadi, Nafea Ali, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Saleh Ahmed, Ali Mohammed, Ali Majeed Alhammadi, Nafea, Ahmad Khalaf, Bashar, A. Mostafa, Salama

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Adaptive Selection Of KLSE Stocks Using Neural Networks by Kok, Chee Foong

    Published 2002
    “…Hence in this study, neural network technology is deployed to build an adaptive neural net trading system, specifically adopting the multilayer feedforward network with backpropagation learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Firas Mohammed Aswad, Firas Mohammed Aswad, Ali Mohammed Saleh Ahmed, Ali Mohammed Saleh Ahmed, Nafea Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Bashar Ahmad Khalaf, Bashar Ahmad Khalaf, Salama A. Mostafa, Salama A. Mostafa

    Published 2022
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Mohammed Saleh Ahmed, Ali, Ali Majeed Alhammadi,, Nafea, Ahmad Khalaf, Bashar, Mostafa, Salama A.

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks by Mohammed Aswad, Firas, Ahmed, Ali Mohammed Saleh, Ali Majeed Alhammadi, Nafea Ali Majeed Alhammadi, Khalaf, Bashar Ahmad, Mostafa, Salama A.

    Published 2023
    “…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article