Search Results - (( model evaluation _ algorithm ) OR ( based information services algorithm ))

Refine Results
  1. 1

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  2. 2

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Tensor-based factorial hidden markov model for Cyber-Physical-Social services by Lu, Zhixing, Yang, Laurence T., Azman, Azreen, Zhang, Shunli, Zhou, Fang

    Published 2025
    “…Additionally, a tensor-based Baum-Welch algorithm is developed to accurately learn model parameters via parameter optimization micro-services. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…As a result, legitimate users are barred from utilizing the service from the MPLS network. This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  6. 6

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Q-learning based vertical handover decision algorithm in LTE-A two-tier macrocell-femtocell systems / Ammar Bathich by Bathich, Ammar

    Published 2019
    “…Modeling issues and the key performance evaluation for HeNB-specific mobility management are discussed and studied as well. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. The higher level priority agreements give a higher or equal probability than the lower level, this technique is perfect at a core router by scheduling algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid Cat Swarm Optimization and Simulated Annealing for Dynamic Task Scheduling on Cloud Computing Environment by Gabi, Danlami, Ismail, Abdul Samad, Zainal, Anazida, Zakaria, Zalmiyah, Al-Khasawneh, Ahmad

    Published 2018
    “…A multi-objective QoS model based on execution time and execution cost criteria is presented to evaluate the efficiency of the proposed algorithm on CloudSim tool with two different datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-based service search and selection algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…In short, our main contributions are outlined new key taxonomy for the semantic-based grid RD studies; an interoperable semantic description RD component model for intergrid services metadata representation; a semantic distributed registry architecture for indexing service metadata; and an agent-qased service search and selection algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of Fuzzy Multi-Criteria Analysis Method for Tender Cleaning Service Selection by Aminudin, Nurul Bazlaa’

    Published 2017
    “…This paper present a development of fuzzy set theory for tender cleaning service selection. It aims to evaluate the tender based on several criterions and provide the information to Tender Owner for selecting the top bidder. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Integration Of Travel Time Zone For Optimal Siting Of Emergency Facilities by Indriasari, Vini

    Published 2008
    “…The objective of the model is to maximize total service area of a fixed number of facilities. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e by Alam Shishir, Md. Khorsed, Abd Latif, Suhaimi, Akter, Mahmuda, Hakak, Saqib Iqbal, Masud, Massarof H., Anwar, Farhat

    Published 2014
    “…Due to this randomness of back-off window algorithm to provide probabilistic QoS to satisfy the multimedia traffic through the network, the random mobility model can reduce the network performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Mitigating malicious nodes using trust and reputation based model in wireless sensor networks by Abdullah, Muhammad Daniel Hafiz

    Published 2018
    “…Most, if not all, existing models in trust and reputation domain are lack in providing sufficient behavioral-based trust information. …”
    Get full text
    Get full text
    Get full text
    Thesis