Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Bat-Inspired Optimization for Intrusion Detection Using an Ensemble Forecasting Method

    R. Anand Babu1,*, S. Kannan2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 307-323, 2022, DOI:10.32604/iasc.2022.024098

    Abstract An Intrusion detection system (IDS) is extensively used to identify cyber-attacks preferably in real-time and to achieve integrity, confidentiality, and availability of sensitive information. In this work, we develop a novel IDS using machine learning techniques to increase the performance of the attack detection process. In order to cope with high dimensional feature-rich traffic in large networks, we introduce a Bat-Inspired Optimization and Correlation-based Feature Selection (BIOCFS) algorithm and an ensemble classification approach. The BIOCFS is introduced to estimate the correlation of the identified features and to choose the ideal subset for training and testing phases. The Ensemble Classifier (EC)… More >

  • Open Access

    ARTICLE

    False Alarm Reduction in ICU Using Ensemble Classifier Approach

    V. Ravindra Krishna Chandar1,*, M. Thangamani2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 165-181, 2022, DOI:10.32604/iasc.2022.022339

    Abstract

    During patient monitoring, false alert in the Intensive Care Unit (ICU) becomes a major problem. In the category of alarms, pseudo alarms are regarded as having no clinical or therapeutic significance, and thus they result in fatigue alarms. Artifacts are misrepresentations of tissue structures produced by imaging techniques. These Artifacts can invalidate the Arterial Blood Pressure (ABP) signal. Therefore, it is very important to develop algorithms that can detect artifacts. However, ABP has algorithmic shortcomings and limitations of design. This study is aimed at developing a real-time enhancement of independent component analysis (EICA) and time-domain detection of QRS that can… More >

  • Open Access

    ARTICLE

    Robust Interactive Method for Hand Gestures Recognition Using Machine Learning

    Amal Abdullah Mohammed Alteaimi1,*, Mohamed Tahar Ben Othman1,2

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 577-595, 2022, DOI:10.32604/cmc.2022.023591

    Abstract The Hand Gestures Recognition (HGR) System can be employed to facilitate communication between humans and computers instead of using special input and output devices. These devices may complicate communication with computers especially for people with disabilities. Hand gestures can be defined as a natural human-to-human communication method, which also can be used in human-computer interaction. Many researchers developed various techniques and methods that aimed to understand and recognize specific hand gestures by employing one or two machine learning algorithms with a reasonable accuracy. This work aims to develop a powerful hand gesture recognition model with a 100% recognition rate. We… More >

  • Open Access

    ARTICLE

    Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier

    R. D. Pubudu L. Indrasiri1, Ernesto Lee2, Vaibhav Rupapara3, Furqan Rustam4, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 489-515, 2022, DOI:10.32604/cmc.2022.019636

    Abstract Malicious traffic detection over the internet is one of the challenging areas for researchers to protect network infrastructures from any malicious activity. Several shortcomings of a network system can be leveraged by an attacker to get unauthorized access through malicious traffic. Safeguard from such attacks requires an efficient automatic system that can detect malicious traffic timely and avoid system damage. Currently, many automated systems can detect malicious activity, however, the efficacy and accuracy need further improvement to detect malicious traffic from multi-domain systems. The present study focuses on the detection of malicious traffic with high accuracy using machine learning techniques.… More >

  • Open Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414

    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic Algorithm (GA) was used for… More >

  • Open Access

    ARTICLE

    Realistic Smile Expression Recognition Approach Using Ensemble Classifier with Enhanced Bagging

    Oday A. Hassen1,*, Nur Azman Abu1, Zaheera Zainal Abidin1, Saad M. Darwish2

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2453-2469, 2022, DOI:10.32604/cmc.2022.019125

    Abstract A robust smile recognition system could be widely used for many real-world applications. Classification of a facial smile in an unconstrained setting is difficult due to the invertible and wide variety in face images. In this paper, an adaptive model for smile expression classification is suggested that integrates a fast features extraction algorithm and cascade classifiers. Our model takes advantage of the intrinsic association between face detection, smile, and other face features to alleviate the over-fitting issue on the limited training set and increase classification results. The features are extracted taking into account to exclude any unnecessary coefficients in the… More >

  • Open Access

    ARTICLE

    Ensemble Classifier Technique to Predict Gestational Diabetes Mellitus (GDM)

    A. Sumathi*, S. Meganathan

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 313-325, 2022, DOI:10.32604/csse.2022.017484

    Abstract Gestational Diabetes Mellitus (GDM) is an illness that represents a certain degree of glucose intolerance with onset or first recognition during pregnancy. In the past few decades, numerous investigations were conducted upon early identification of GDM. Machine Learning (ML) methods are found to be efficient prediction techniques with significant advantage over statistical models. In this view, the current research paper presents an ensemble of ML-based GDM prediction and classification models. The presented model involves three steps such as preprocessing, classification, and ensemble voting process. At first, the input medical data is preprocessed in four levels namely, format conversion, class labeling,… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

Displaying 11-20 on page 2 of 18. Per Page