Search Results - (( model evaluation _ algorithm ) OR ( based information services algorithm ))
Search alternatives:
- information services »
- based information »
- model evaluation »
-
1
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
2
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
3
Tensor-based factorial hidden markov model for Cyber-Physical-Social services
Published 2025“…Additionally, a tensor-based Baum-Welch algorithm is developed to accurately learn model parameters via parameter optimization micro-services. …”
Get full text
Get full text
Get full text
Article -
4
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
5
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…As a result, legitimate users are barred from utilizing the service from the MPLS network. This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
6
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
7
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich
Published 2019“…Modeling issues and the key performance evaluation for HeNB-specific mobility management are discussed and studied as well. …”
Get full text
Get full text
Thesis -
9
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. The higher level priority agreements give a higher or equal probability than the lower level, this technique is perfect at a core router by scheduling algorithm. …”
Get full text
Get full text
Thesis -
10
Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment
Published 2018“…A multi-objective QoS model based on execution time and execution cost criteria is presented to evaluate the efficiency of the proposed algorithm on CloudSim tool with two different datasets. …”
Get full text
Get full text
Get full text
Article -
11
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…Within this contextual framework, we have crafted a sophisticated credit evaluation algorithm and model tailored explicitly for cloud 3D printing service providers. …”
Get full text
Get full text
Get full text
Article -
12
Hybridization of enhanced ant colony system and Tabu search algorithm for packet routing in wireless sensor network
Published 2020“…A total of 6 datasets were deployed to evaluate the effectiveness of the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-based service search and selection algorithm. …”
Get full text
Get full text
Thesis -
14
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-qased service search and selection algorithm. …”
Get full text
Get full text
Thesis -
15
Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection
Published 2017“…This paper present a development of fuzzy set theory for tender cleaning service selection. It aims to evaluate the tender based on several criterions and provide the information to Tender Owner for selecting the top bidder. …”
Get full text
Get full text
Final Year Project -
16
Integration Of Travel Time Zone For Optimal Siting Of Emergency Facilities
Published 2008“…The objective of the model is to maximize total service area of a fixed number of facilities. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e
Published 2014“…Due to this randomness of back-off window algorithm to provide probabilistic QoS to satisfy the multimedia traffic through the network, the random mobility model can reduce the network performance. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…The performance of the genetic algorithm with 2-satisfiability-based reverse analysis was measured according to the selected performance evaluation metrics. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
Published 2018“…Most, if not all, existing models in trust and reputation domain are lack in providing sufficient behavioral-based trust information. …”
Get full text
Get full text
Get full text
Thesis
