Search Results - intelligence based ((((protocol algorithm) OR (mining algorithm))) OR (bayes algorithm))
Search alternatives:
- intelligence based »
- protocol algorithm »
- mining algorithm »
- bayes algorithm »
-
1
-
2
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
4
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The intelligent algorithm ML-ADR fault classifier model could discriminate 10 different far-end short circuit fault types from two network topology changes with and without midpoint integrated STATCOM on the Matlab/Simulink power grid system model. …”
Get full text
Get full text
Thesis -
7
Artificial neural network approach for electric load forecasting in power distribution company / Hambali M. A ... [et al.]
Published 2017“…Researchers then performed data preprocessing on the data. Afterwards, data mining algorithms were applied in order to forecast electric load. …”
Get full text
Get full text
Get full text
Article -
8
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. …”
Get full text
Get full text
Get full text
Article -
9
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
10
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
11
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
12
Cohesive token passing algorithm utilizing software agents
Published 2010“…The core of the new protocol is based on the circulation mechanism of the token. …”
Get full text
Get full text
Article -
13
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
14
An application of predicting student performance using kernel k-means and smooth support vector machine
Published 2012“…In this study, psychometric factors used as predictor variables, thereare Interest, Study Behavior, Engaged Time, Believe, and Family Support.The rulemodel developed using Kernel K-means Clustering and Smooth Support Vector MachineClassification.Both of these techniquesbased on kernel methodsand relativelynew algorithms of data mining techniques, recently received increasingly popularity in machine learning community. …”
Get full text
Get full text
Thesis -
15
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
16
-
17
-
18
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
Get full text
Get full text
Article -
19
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
20
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. …”
Get full text
Get full text
Get full text
Get full text
Article
