Search Results - (( a distribution system algorithm ) OR ( _ evaluation ((based algorithm) OR (bayes algorithm)) ))

Refine Results
  1. 1
  2. 2

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Yasin, Waheed, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Airline flight delay prediction using Naïve Bayes algorithm / Ahmad Adib Baihaqi Shukri by Shukri, Ahmad Adib Baihaqi

    Published 2024
    “…This study aims to study the Naïve Bayes algorithm for flight delay prediction. The objective is to develop a reliable flight delay prediction model using the Naïve Bayes algorithm and evaluate its performance. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman by Mohd Rahiman, Nurulizzah

    Published 2024
    “…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evaluation of boruta algorithm in DDoS detection by Noor Farhana, Mohd Zuki, Ahmad Firdaus, Zainal Abidin, Mohd Faaizie, Darmawan, Mohd Faizal, Ab Razak

    Published 2023
    “…To evaluate the Boruta algorithm, multiple classifiers (J48, random forest, naïve bayes, and multilayer perceptron) were used so as to determine the effectiveness of the features selected by the the Boruta algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim by Masmuhallim, Anis Athirah

    Published 2024
    “…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks by Saqer, Ahmad Sabri Mousa

    Published 2012
    “…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation by Khan, Abdullah

    Published 2022
    “…Finally, a crowding distance and non-dominated-sorting-based multi-objective hybrid firefly & particle swarm optimization (MOHFPSO) algorithm is designed for MOOPF problems. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband by Shamshirband, Shahaboddin

    Published 2014
    “…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Levy tunicate swarm algorithm for solving numerical and real-world optimization problems by J. J., Jui, M. A., Ahmad, M. I. M., Rashid

    Published 2022
    “…The proposed Levy Tunicate Swarm Algorithm (LTSA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic algorithm called Tunicate Swarm Algorithm (TSA) to solve numerical and real-world optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Anomaly-based intrusion detection through K-means clustering and naives Bayes classification by Mohamed Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md. Nasir

    Published 2013
    “…We propose an integrated machine learning algorithm across K-Means clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification by Yassin, Warusia, Udzir, Nur Izura, Muda, Zaiton, Sulaiman, Md Nasir

    Published 2013
    “…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…Finally, the global CDN build using the algorithm is evaluated based on the time needed to build the global CDN and the clock buffer numbers and areas used. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid by Ariya Sinhalage Buddhika Eshan Karunarathne

    Published 2023
    “…In addition, the influence of multiple DG integrations was evaluated focusing on successive DG integrations. A voltage stability index-based approach was adopted to establish the optimal locations of the DGs in the system. …”
    text::Thesis
  20. 20

    Performance evaluation for different intrusion detection system algorithms using machine learning by Zarir, Mustafa Nadhim

    Published 2018
    “…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis