Search Results - (( intelligence system growth algorithm ) OR ( intelligence data modeling algorithm ))
Search alternatives:
- intelligence system »
- modeling algorithm »
- intelligence data »
- growth algorithm »
- data modeling »
-
1
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…A new non classification algorithm was developed based on the danger theory model of human immune system (HIS).The abstract model of system algorithm is inspired from HIS cell mechanism mainly, the Dendritic cell behavior and T-cell mechanisms. …”
Get full text
Get full text
Get full text
Citation Index Journal -
2
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
3
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
4
An intelligent risk management framework for monitoring vehicular engine health
Published 2022“…We used machine learning and deep learning algorithms to assess the effectiveness of the risk management system’s decision model. …”
Get full text
Get full text
Get full text
Article -
5
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
Get full text
Get full text
Thesis -
6
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository
Published 2017Get full text
Get full text
Get full text
Get full text
Book Chapter -
7
-
8
A machine learning approach to movie recommendation system
Published 2025“…This work demonstrates the potential of intelligent systems to improve user satisfaction in digital media platforms.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
Get full text
Get full text
Get full text
Thesis -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Adaptive Selection Of KLSE Stocks Using Neural Networks
Published 2002“…Hence in this study, neural network technology is deployed to build an adaptive neural net trading system, specifically adopting the multilayer feedforward network with backpropagation learning algorithm. …”
Get full text
Get full text
Get full text
Thesis -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. …”
Get full text
Get full text
Get full text
Article
