Search Results - (( a distribution system algorithm ) OR ( _ evaluation ((based algorithm) OR (bayes algorithm)) ))
Search alternatives:
- system algorithm »
- bayes algorithm »
- a distribution »
-
1
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
2
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
3
Airline flight delay prediction using Naïve Bayes algorithm / Ahmad Adib Baihaqi Shukri
Published 2024“…This study aims to study the Naïve Bayes algorithm for flight delay prediction. The objective is to develop a reliable flight delay prediction model using the Naïve Bayes algorithm and evaluate its performance. …”
Get full text
Get full text
Thesis -
4
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
5
Evaluation of boruta algorithm in DDoS detection
Published 2023“…To evaluate the Boruta algorithm, multiple classifiers (J48, random forest, naïve bayes, and multilayer perceptron) were used so as to determine the effectiveness of the features selected by the the Boruta algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Mobile banking Trojan detection using Naive Bayes / Anis Athirah Masmuhallim
Published 2024“…The objectives of this project are to study the requirement of the Naive Bayes algorithm in Mobile Banking Trojan detection, to develop a webbased detection system for Mobile Banking Trojan using Naive Bayes, and to evaluate the performance and accuracy of the Naive Bayes algorithm in the Mobile Banking Trojan detection. …”
Get full text
Get full text
Thesis -
7
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…On the other hand, the proposed distributed scheduling algorithm (MR-DSA) was evaluated by comparing its performance against performances of Greedy and the factor-graph-based low-complexity distributed scheduling algorithm (FGDS) algorithms in terms of delay, throughput, and overhead. …”
Get full text
Get full text
Thesis -
8
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
9
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Finally, a crowding distance and non-dominated-sorting-based multi-objective hybrid firefly & particle swarm optimization (MOHFPSO) algorithm is designed for MOOPF problems. …”
Get full text
Get full text
Thesis -
10
-
11
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Adaptive optimization techniques such as fuzzy logic controller (FLC), reinforcement learning are discussed in this thesis in order to adopt Q-leaning algorithm to FLCs. We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
12
Hybrid ant colony system algorithm for static and dynamic job scheduling in grid computing
Published 2015“…Grid computing is a distributed system with heterogeneous infrastructures. …”
Get full text
Get full text
Get full text
Thesis -
13
Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines
Published 2023Conference Paper -
14
Levy tunicate swarm algorithm for solving numerical and real-world optimization problems
Published 2022“…The proposed Levy Tunicate Swarm Algorithm (LTSA) is a novel metaheuristic algorithm that integrates the Levy distribution into a new metaheuristic algorithm called Tunicate Swarm Algorithm (TSA) to solve numerical and real-world optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013“…We propose an integrated machine learning algorithm across K-Means clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013“…Regrettably, the foremost challenge of this method is to minimize false alarm while maximizing detection and accuracy rate.We propose an integrated machine learning algorithm across K-Mean s clustering and Naïve Bayes Classifier called KMC+NBC to overcome the aforesaid drawbacks.K-Means clustering is applied to labeling and gathers the entire data into corresponding cluster sets based on the data behavior,i.e.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…The results show a significant improvement compared to other algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…Finally, the global CDN build using the algorithm is evaluated based on the time needed to build the global CDN and the clock buffer numbers and areas used. …”
Get full text
Get full text
Thesis -
19
Multi leader particle swarm optimization for optimal placement and sizing of multiple distributed generation for a micro grid
Published 2023“…In addition, the influence of multiple DG integrations was evaluated focusing on successive DG integrations. A voltage stability index-based approach was adopted to establish the optimal locations of the DGs in the system. …”
text::Thesis -
20
Performance evaluation for different intrusion detection system algorithms using machine learning
Published 2018“…The objectives of this project is to evaluate the performance of various intrusion detection algorithms based on machine learning. …”
Get full text
Get full text
Get full text
Get full text
Thesis
