Search Results - intelligence based ((((rsa algorithm) OR (acs algorithm))) OR (bayes algorithm))

Refine Results
  1. 1
  2. 2

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A medical cyber-physical system utilizing the bayes algorithm for post-diagnosis patient supervision by Mizanur, Rahman, Talha, Sarwar, Ahmed, Zahiduddin, Miah, M. Saef Ullah, Bhowmik, Abhijit, Nusrat, Fahmeda, Junaida, Sulaiman

    Published 2024
    “…Therefore, this article proposes an adaptive system based on the Bayes algorithm for performing medical interventions on patients, leading to a reduction in the dependence on caregivers, particularly in the post-diagnosis scenario.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Machine Learning Applications in Offense Type and Incidence Prediction by Balaji, R., Manjula Sanjay, Koti, Harprith, Kaur

    Published 2024
    “…Naive Bayes, a probabilistic classifier based on Bayes' theorem, is particularly effective in handling large datasets and making accurate predictions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12

    A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier by Azad, Saiful, Amin Salem, Saleh Bllagdham, Mahmud, Mufti, Kaiser, M. Shamim, Miah, Md Saef Ullah

    Published 2021
    “…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The intelligent algorithm ML-ADR fault classifier model could discriminate 10 different far-end short circuit fault types from two network topology changes with and without midpoint integrated STATCOM on the Matlab/Simulink power grid system model. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network by Husna, Jamal Abdul Nasir

    Published 2020
    “…This research proposes a hybridization of Enhanced ACS and Tabu Search (EACS(TS)) algorithm for packet routing in WSN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Quantum-Resistant Cryptography in Cyber Security by Bhargavgowda, A.B., Chitra, K.

    Published 2025
    “…While quantum systems promise advances in science, engineering, and artificial intelligence, they also pose a substantial threat to classical cryptographic techniques such as RSA, ECC, and other widely deployed public-key mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Hidden markov model for decision making among heterogeneous systems in intelligent building by Abba, Babakura

    Published 2014
    “…In order to improve the response time a machine learning algorithm like Hidden Markov Model (HMM) instead of the rule-based is used. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20