Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Effective Classifier Model for Imbalanced Network Attack Data

    Gürcan Çetin*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4519-4539, 2022, DOI:10.32604/cmc.2022.031734

    Abstract Recently, machine learning algorithms have been used in the detection and classification of network attacks. The performance of the algorithms has been evaluated by using benchmark network intrusion datasets such as DARPA98, KDD’99, NSL-KDD, UNSW-NB15, and Caida DDoS. However, these datasets have two major challenges: imbalanced data and high-dimensional data. Obtaining high accuracy for all attack types in the dataset allows for high accuracy in imbalanced datasets. On the other hand, having a large number of features increases the runtime load on the algorithms. A novel model is proposed in this paper to overcome these two concerns. The number of… More >

  • Open Access

    ARTICLE

    An Ensemble Methods for Medical Insurance Costs Prediction Task

    Nataliya Shakhovska1, Nataliia Melnykova1,*, Valentyna Chopiyak2, Michal Gregus ml3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3969-3984, 2022, DOI:10.32604/cmc.2022.019882

    Abstract The paper reports three new ensembles of supervised learning predictors for managing medical insurance costs. The open dataset is used for data analysis methods development. The usage of artificial intelligence in the management of financial risks will facilitate economic wear time and money and protect patients’ health. Machine learning is associated with many expectations, but its quality is determined by choosing a good algorithm and the proper steps to plan, develop, and implement the model. The paper aims to develop three new ensembles for individual insurance costs prediction to provide high prediction accuracy. Pierson coefficient and Boruta algorithm are used… More >

Displaying 1-10 on page 1 of 2. Per Page