Search Results - (( solution service learning algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- learning algorithm »
- implication based »
- service learning »
- java implication »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
Article -
4
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
5
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…Also, the proposed algorithms focus on the need for cooperative learning that maintains the quality of service, adapts to the network dynamics and achieves energy efficiency in dense small-cell networks. …”
Get full text
Get full text
Thesis -
6
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
text::Thesis -
7
-
8
User-centric learning for multiple access selections
Published 2019“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…This paper examines the role of AI in the improvement of cloud security with specific emphasis on deep learning, ensemble learning and lightweight AI approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
User-centric learning for multiple access selections
Published 2023“…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
Article -
11
-
12
Detection of DDoS attacks in IoT networks using machine learning algorithms
Published 2025Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing
Published 2025“…The HHO algorithm was employed as a local search strategy in this suggested algorithm to improve the quality of authorized solutions. …”
Get full text
Get full text
Get full text
Article -
14
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
Get full text
Get full text
Conference or Workshop Item -
15
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
16
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
17
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
18
A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing
Published 2022“…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
Get full text
Get full text
Conference or Workshop Item -
19
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
Get full text
Get full text
Thesis
