Search Results - intelligence based ((((data algorithm) OR (bayes algorithm))) OR (rsa algorithm))
Search alternatives:
- intelligence based »
- bayes algorithm »
- data algorithm »
- rsa algorithm »
-
1
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
2
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
New approach of cryptography algorithm for e- mail applications
Published 2005Get full text
Get full text
Conference or Workshop Item -
4
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…Naive Bayes, a probabilistic classifier based on Bayes' theorem, is particularly effective in handling large datasets and making accurate predictions. …”
Get full text
Get full text
Get full text
Article -
5
Feature selection based on particle swarm optimization algorithm for sentiment analysis classification
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021Get full text
Get full text
Get full text
Article -
7
Evaluation of fall detection classification approaches
Published 2012Get full text
Get full text
Conference or Workshop Item -
8
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
9
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…Quantum algorithms including Shor’s and Grover’s are expected to compromise these systems, placing sensitive data, financial infrastructures, and national security at risk. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
11
-
12
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The intelligent algorithm ML-ADR fault classifier model could discriminate 10 different far-end short circuit fault types from two network topology changes with and without midpoint integrated STATCOM on the Matlab/Simulink power grid system model. …”
Get full text
Get full text
Thesis -
13
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
14
Sleep as a predictor of depression level using Naïve Bayes / Nur Syakinah Md Roduan
Published 2017“…Future work on this subject should improve the findings by modifying the variables used and/or by using other methods in term of data collection or the algorithm itself.…”
Get full text
Get full text
Thesis -
15
Hidden markov model for decision making among heterogeneous systems in intelligent building
Published 2014“…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
Get full text
Get full text
Thesis -
16
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
17
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
18
A proposed model for text and image encryption using different techniques
Published 2023“…In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. …”
Article -
19
An efficient computational intelligence technique for classification of protein sequences
Published 2014“…Many artificial intelligence techniques have been developed to process the constantly increasing volume of data to extract meaningful information from it. …”
Get full text
Get full text
Conference or Workshop Item -
20
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023text::Thesis
