Search Results - (( intelligence system model algorithm ) OR ( intelligence based web algorithm ))
Search alternatives:
- intelligence system »
- intelligence based »
- model algorithm »
- web algorithm »
- based web »
-
1
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
Get full text
Get full text
Article -
2
An intelligent condition monitoring system for fault diagnosis of rotating machinery using expert systems with optimization techniques
Published 2012Subjects: Get full text
Working Paper -
3
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih
Published 2001“…The purpose of the study is to develop a web-based self assessment information system that can be used to obtain a model for prediction of information technology competency among teacher trainees in teaching institutes. …”
Get full text
Get full text
Get full text
Thesis -
11
A machine learning approach to movie recommendation system
Published 2025“…This work demonstrates the potential of intelligent systems to improve user satisfaction in digital media platforms.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Fakebuster: fake news detection system using logistic regression technique in machine learning
Published 2019“…Fake news can be certainly solved by the aid of artificial intelligence which includes machine learning algorithms. …”
Get full text
Get full text
Article -
13
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
14
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
15
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…The use of software-agent based middleware that is intelligent, enables the system to adapt to the ever changing in taste and preferences of users when predicting the buying intention, thus making the online marketing to be highly effective. …”
Get full text
Get full text
Conference or Workshop Item -
16
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. This performance criteria result indicated that this model is an efficient worm response model.…”
Proceedings Paper -
17
A systematic review of machine learning techniques and applications in soil improvement using green materials
Published 2023“…Additionally, the approaches covered in this research will assist geotechnical practitioners in understanding the strengths and weaknesses of artificial intelligence algorithms compared to other traditional mathematical modeling techniques.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Prototype development of Web AI-based decision support system: insights and recommendations for satellite anomaly identification
Published 2025“…Hence, this paper proposes a Web AI-based Decision Support System (DSS) designed to enhance the identification and resolution of satellite anomalies. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis
