Search Results - (( solution service learning algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  3. 3

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
    Article
  4. 4

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…Also, the proposed algorithms focus on the need for cooperative learning that maintains the quality of service, adapts to the network dynamics and achieves energy efficiency in dense small-cell networks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…Machine Learning (ML) is seen as a promising application that offers autonomous learning and provides optimized solutions to complex problems. …”
    text::Thesis
  7. 7
  8. 8

    User-centric learning for multiple access selections by Dzulkifli, Sumayyah, Hashim, Wahidah, Ismail, Ahmad Fadzil, Dohler, Mischa

    Published 2019
    “…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…This paper examines the role of AI in the improvement of cloud security with specific emphasis on deep learning, ensemble learning and lightweight AI approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    User-centric learning for multiple access selections by Dzulkifly S., Hashim W., Ismail A.F., Dohler M.

    Published 2023
    “…The second stage involved utilizing a reinforcement learning algorithm known as q-learning, to learn from feedbacks to identify optimal decision in reaching user-centric requirement goal. …”
    Article
  11. 11
  12. 12
  13. 13

    Hybrid Henry Gas-Harris Hawks comprehensive-opposition algorithm for task scheduling in cloud computing by Omran Alkaam, Nora, Md Sultan, Abu Bakar, Hussin, Masnida, Yatim Sharif, Khaironi

    Published 2025
    “…The HHO algorithm was employed as a local search strategy in this suggested algorithm to improve the quality of authorized solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…This paper proposes the web service education technology for postgraduate parallel computing course, e-learning students, real-time solutions and for supervising projects related to the application of parallel computing, that focuses on the fundamental principles to parallel computer architecture, multimedia, communication cost, master-worker model, parallel algorithm, web services and performance evaluations. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A Principled Design of Intelligent Agent for the SLA negotiation process in cloud computing by Kumar, R., Hassan, M.F., Adnan, M.H.M.

    Published 2022
    “…IANS uses a behavioural learning analysis algorithm between consumers and CSP to select a reliable, secure server at a minimum cost. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks by Najmun, Najmun

    Published 2024
    “…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
    Get full text
    Get full text
    Thesis