Search Results - (( intelligence system using algorithm ) OR ( intelligence service based algorithm ))
Search alternatives:
- intelligence service »
- intelligence system »
- using algorithm »
-
1
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
Get full text
Get full text
Thesis -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
3
-
4
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
5
Intelligent Vision-Based Navigation System For Mobile Robot: A Technological Review
Published 2018“…These include the utilization of mobile robot in various sectors such as manufacturing, warehouse, agriculture, outdoor navigation and other service sectors. Multiple intelligent algorithms used in developing robot vision system were also reviewed.…”
Get full text
Get full text
Get full text
Article -
6
EM-Psychiatry: An Ambient Intelligent System for Psychiatric Emergency
Published 2016“…In this paper, an ambient intelligent system of in-home psychiatric care service for emergency psychiatry (EM-psychiatry) is proposed for the remote monitoring of psychiatric emergency patients. …”
Get full text
Get full text
Article -
7
Hidden markov model for decision making among heterogeneous systems in intelligent building
Published 2014“…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
Get full text
Get full text
Thesis -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
9
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…As a result, legitimate users are barred from utilizing the service from the MPLS network. This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
10
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…The self-driving car is a type of autonomous vehicle that can drive autonomously based on Artificial Intelligence (AI). It is based on the use of sensors, actuators, sophisticated algorithms, machine learning systems, and robust processors. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
13
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…It leads to network disturbances, interruption of communication and significant damage to services. Researchers seek to develop intelligent algorithms to detect and prevent DDoS attacks. …”
Get full text
Get full text
Get full text
Article -
15
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…ASEF system is fully dynamic with fuzzy logic based approach and adaptive deadline-based scheme for various service class traffics. …”
Get full text
Get full text
Thesis -
16
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The Recommender agent then determines the user’s most preferred interest and matches them against other users sharing similar interest. The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
17
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
20
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…To provide intelligent personalized online services such as web recommender systems, it is usually necessary to model users’ web access behavior. …”
Get full text
Get full text
Article
