Search Results - (( java implementation phase algorithm ) OR ( computing services learning algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…This is because some of the computer users do not install security system in their computer. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
    Get full text
    Get full text
    Article
  10. 10

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing by Shukla, S., Hassan, M.F., Jung, L.T., Awang, A.

    Published 2019
    “…This hybrid approach integrates healthcare IoT devices with the cloud and uses fog services with Fuzzy Reinforcement Learning Data Packet Allocation (FRLDPA) algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Therefore, supplying optimized scheduling algorithms to provide satisfactory quality service for the node’s task execution and processing becomes demanding. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Evaluation of boruta algorithm in DDoS detection by Noor Farhana, Mohd Zuki, Ahmad Firdaus, Zainal Abidin, Mohd Faaizie, Darmawan, Mohd Faizal, Ab Razak

    Published 2023
    “…Distributed Denial of Service (DDoS) is a type of attack that leverages many compromised systems or computers, as well as multiple Internet connections, to flood targeted resources simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Applications of Machine Learning in Networking: A Survey of Current Issues and Future Challenges by Ridwan M.A., Radzi N.A.M., Abdullah F., Jalil Y.E.

    Published 2023
    “…Intrusion detection; Machine learning; Quality of service; Complex problems; Computational model; Future challenges; Improve performance; Ml algorithms; Performance issues; Resource management; Rule based algorithms; Complex networks…”
    Article
  19. 19
  20. 20