Search Results - (( intelligence system tree algorithm ) OR ( intelligence service based algorithm ))*

Refine Results
  1. 1

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
    Get full text
    Get full text
    Article
  2. 2

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects by Mohammed, Waheed Yasin

    Published 2018
    “…On the other hand, they do not consider the advantages that can be given by applying these approaches in peer-to-peer systems. In this work, intelligent collaborative web caching approaches based on C4.5 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik

    Published 2022
    “…Fortunately, Artificial Intelligence (AI) has recently attracted a lot of attention, and it is now a principal component of these systems. …”
    Get full text
    Get full text
    Article
  11. 11

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Ozone Concentration Forecasting Based on Artificial Intelligence Techniques: A Systematic Review by Yafouz A., Ahmed A.N., Zaini N., El-Shafie A.

    Published 2023
    “…Decision trees; Forecasting; Multilayer neural networks; Ozone; Predictive analytics; Support vector machines; Artificial intelligence techniques; Machine learning techniques; Multi layer perceptron; Optimization approach; Ozone concentration forecasting; Prediction accuracy; Stand-alone algorithm; Tropospheric ozone concentration; Learning systems; ozone; air quality; algorithm; concentration (composition); machine learning; optimization; ozone; prediction; theoretical study; air pollutant; air quality; artificial intelligence; artificial neural network; concentration (parameter); decision tree; feed forward neural network; forecasting; fuzzy system; human; measurement accuracy; multilayer perceptron; prediction; random forest; recurrent neural network; Review; support vector machine; systematic review…”
    Review
  15. 15

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…To derive a complete intelligent state-of-the-art hybrid control system, several experiments were conducted in the study. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…This project is involved with identification of the available algorithms used in data classification and the implementation of C4.5 decision tree induction algorithm in solving the data classifying task. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III by Liu, Jiajia, Zainudin, Edi Syams, As'arry, Azizan, Ismail, Mohd Idris Shah

    Published 2024
    “…The study concludes that the NSGA III algorithm exhibits significant potential in optimizing the orchestration of cloud-based 4D printing service portfolios, underscoring its effectiveness in managing the complexities associated with these services. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20