Search Results - intelligence _ ((protocol algorithm) OR (((window algorithm) OR (mining algorithm))))
Search alternatives:
- protocol algorithm »
- window algorithm »
- mining algorithm »
-
1
-
2
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
3
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023Conference paper -
4
-
5
-
6
-
7
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…Researchers then performed data preprocessing on the data. Afterwards, data mining algorithms were applied in order to forecast electric load. …”
Get full text
Get full text
Get full text
Article -
8
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
9
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
Get full text
Get full text
Article -
10
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
11
Intelligent mining of large-scale bio-data: bioinformatics applications
Published 2017“…Hence, there is a high potential to raise the interaction between artificial intelligence and bio-data mining. The present paper argues how artificial intelligence can assist bio-data analysis and gives an up-to-date review of different applications of bio-data mining. …”
Get full text
Get full text
Get full text
Article -
12
Algorithms for frequent itemset mining: a literature review
Published 2018Get full text
Get full text
Article -
13
-
14
Intelligent DNA signature detection for internet worms
Published 2011“…Active worms spread in an automated fashion flooding the Internet in a very short time.Slammer worm infected more than 90% of vulnerable machines within 10 minutes on January 25th, 2003.Hence it is necessary to monitor and detect the worms as soon as they are introduced to minimize the damage caused by them.This project concentrates on developing an anti-scanning worm detection system that can automatically detect and control the spread of internet scanning worms without any manual intervention.The Intelligent Failure Connection Algorithm (IFCA) developed in this project can detect both stealth and normal worms within a short time.Experiments conducted as part of the evaluation shows that IFCA detects a worm within two scanning cycles of the worm.This is faster than any of the currently available algorithms or mechanisms reported in the literature.The IFCA uses Artificial Immune System (AIS) for the purpose of monitoring and detecting the worms.The Traffic Signature Algorithm (TSA) developed in the project captures the traffic signature of the worm from the infector when it sends the traffic to the victim.The Intelligent DNA Signature Detection Algorithm (IDNASDA) algorithm works by breaking an infection session into different infection phases, each phase containing a number of different traffic such as Internet Control Message Protocol (ICMP), Transmission Control Protocol (TCP), or User Datagram Protocol (UDP).Finally it converts the traffic signature to DNA signature.The tests carried out show that the IDNASD could detect DNA signature for MSBlaster worm.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
Mining least relational patterns from multi relational tables
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
17
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Database or data warehouse is rich with hidden information that can be used to provide intelligent decision using data mining technique. Data mining is a widely used approach for knowledge discovery in machine learning. …”
Get full text
Get full text
Research Reports -
18
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
Get full text
Get full text
Thesis -
19
-
20
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
Published 2022“…The Artificial Bee Colony (ABC) is a popular swarm intelligence algorithm for COP. In this study, existing Modified ABC (MABC) algorithm is revised to solve the VRPTW. …”
Get full text
Get full text
Thesis
