Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (110)
  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    Detection of Alzheimer’s Disease Progression Using Integrated Deep Learning Approaches

    Jayashree Shetty1, Nisha P. Shetty1,*, Hrushikesh Kothikar1, Saleh Mowla1, Aiswarya Anand1, Veeraj Hegde2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1345-1362, 2023, DOI:10.32604/iasc.2023.039206

    Abstract Alzheimer’s disease (AD) is an intensifying disorder that causes brain cells to degenerate early and destruct. Mild cognitive impairment (MCI) is one of the early signs of AD that interferes with people’s regular functioning and daily activities. The proposed work includes a deep learning approach with a multimodal recurrent neural network (RNN) to predict whether MCI leads to Alzheimer’s or not. The gated recurrent unit (GRU) RNN classifier is trained using individual and correlated features. Feature vectors are concatenated based on their correlation strength to improve prediction results. The feature vectors generated are given as the input to multiple different… More >

  • Open Access

    ARTICLE

    Cartographie des surfaces pastorales à l’aide des données Sentinel 2 L3A et des données ouvertes

    Promesses et réalités

    Urcel Kalenga Tshingomba1,2, Magali Jouven2, Lucile Sautot2 , Imad Shaqura2, Maguelonne Teisseire1

    Revue Internationale de Géomatique, Vol.30, No.2, pp. 245-277, 2020, DOI:10.3166/rig.2022.00112

    Abstract Dans cet article, les auteurs expérimentent une démarche permettant de produire une cartographie cohérente de l’occupation des sols des surfaces des parcours en zones périméditerranéennes françaises représentées par les régions Occitanie et Provence-AlpesCôte d’Azur. Quatre différentes sources de données sont utilisées : l’occupation des sols millésime OSO (OSO), le Registre parcellaire graphique (RPG), la BD-Forêt V.2.0 et les données satellites Sentinel 2 L3A. Le RPG de 2019 et la BD-Forêt actualisée en 2018 ont été utilisés comme principale source de données de référence pour l’entraînement des modèles en vue de classifier les objets OSO 2019 de faible F-score, après extraction… More >

  • Open Access

    ARTICLE

    Power Transformer Fault Diagnosis Using Random Forest and Optimized Kernel Extreme Learning Machine

    Tusongjiang Kari1, Zhiyang He1, Aisikaer Rouzi2, Ziwei Zhang3, Xiaojing Ma1,*, Lin Du1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 691-705, 2023, DOI:10.32604/iasc.2023.037617

    Abstract Power transformer is one of the most crucial devices in power grid. It is significant to determine incipient faults of power transformers fast and accurately. Input features play critical roles in fault diagnosis accuracy. In order to further improve the fault diagnosis performance of power transformers, a random forest feature selection method coupled with optimized kernel extreme learning machine is presented in this study. Firstly, the random forest feature selection approach is adopted to rank 42 related input features derived from gas concentration, gas ratio and energy-weighted dissolved gas analysis. Afterwards, a kernel extreme learning machine tuned by the Aquila… More >

  • Open Access

    ARTICLE

    Optimized Decision Tree and Black Box Learners for Revealing Genetic Causes of Bladder Cancer

    Sait Can Yucebas*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 49-71, 2023, DOI:10.32604/iasc.2023.036871

    Abstract The number of studies in the literature that diagnose cancer with machine learning using genome data is quite limited. These studies focus on the prediction performance, and the extraction of genomic factors that cause disease is often overlooked. However, finding underlying genetic causes is very important in terms of early diagnosis, development of diagnostic kits, preventive medicine, etc. The motivation of our study was to diagnose bladder cancer (BCa) based on genetic data and to reveal underlying genetic factors by using machine-learning models. In addition, conducting hyper-parameter optimization to get the best performance from different models, which is overlooked in… More >

  • Open Access

    ARTICLE

    Code Reviewer Intelligent Prediction in Open Source Industrial Software Project

    Zhifang Liao1, Bolin Zhang1, Xuechun Huang1, Song Yu1,*, Yan Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 687-704, 2023, DOI:10.32604/cmes.2023.027466

    Abstract Currently, open-source software is gradually being integrated into industrial software, while industry protocols in industrial software are also gradually transferred to open-source community development. Industrial protocol standardization organizations are confronted with fragmented and numerous code PR (Pull Request) and informal proposals, and different workflows will lead to increased operating costs. The open-source community maintenance team needs software that is more intelligent to guide the identification and classification of these issues. To solve the above problems, this paper proposes a PR review prediction model based on multi-dimensional features. We extract 43 features of PR and divide them into five dimensions: contributor,… More >

  • Open Access

    ARTICLE

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

    Mustafa Sami Abdullatef*, Faten N. Alzubaidi, Anees Al-Tamimi, Yasser Ahmed Mahmood

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2083-2107, 2023, DOI:10.32604/fdmp.2023.027266

    Abstract The ongoing effort to create methods for detecting and quantifying fatigue damage is motivated by the high levels of uncertainty in present fatigue-life prediction approaches and the frequently catastrophic nature of fatigue failure. The fatigue life of high strength aluminum alloy 2090-T83 is predicted in this study using a variety of artificial intelligence and machine learning techniques for constant amplitude and negative stress ratios (). Artificial neural networks (ANN), adaptive neuro-fuzzy inference systems (ANFIS), support-vector machines (SVM), a random forest model (RF), and an extreme-gradient tree-boosting model (XGB) are trained using numerical and experimental input data obtained from fatigue tests… More > Graphic Abstract

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

  • Open Access

    ARTICLE

    Intelligent Sound-Based Early Fault Detection System for Vehicles

    Fawad Nasim1,2,*, Sohail Masood1,2, Arfan Jaffar1,2, Usman Ahmad1, Muhammad Rashid3

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3175-3190, 2023, DOI:10.32604/csse.2023.034550

    Abstract An intelligent sound-based early fault detection system has been proposed for vehicles using machine learning. The system is designed to detect faults in vehicles at an early stage by analyzing the sound emitted by the car. Early detection and correction of defects can improve the efficiency and life of the engine and other mechanical parts. The system uses a microphone to capture the sound emitted by the vehicle and a machine-learning algorithm to analyze the sound and detect faults. A possible fault is determined in the vehicle based on this processed sound. Binary classification is done at the first stage… More >

  • Open Access

    ARTICLE

    Prediction of NFT Sale Price Fluctuations on OpenSea Using Machine Learning Approaches

    Zixiong Wang, Qiuying Chen, Sang-Joon Lee*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2443-2459, 2023, DOI:10.32604/cmc.2023.037553

    Abstract The rapid expansion of the non-fungible token (NFT) market has attracted many investors. However, studies on the NFT price fluctuations have been relatively limited. To date, the machine learning approach has not been used to demonstrate a specific error in NFT sale price fluctuation prediction. The aim of this study was to develop a prediction model for NFT price fluctuations using the NFT trading information obtained from OpenSea, the world’s largest NFT marketplace. We used Python programs to collect data and summarized them as: NFT information, collection information, and related account information. AdaBoost and Random Forest (RF) algorithms were employed… More >

  • Open Access

    ARTICLE

    Grey Wolf-Based Method for an Implicit Authentication of Smartphone Users

    Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3729-3741, 2023, DOI:10.32604/cmc.2023.036020

    Abstract Smartphones have now become an integral part of our everyday lives. User authentication on smartphones is often accomplished by mechanisms (like face unlock, pattern, or pin password) that authenticate the user’s identity. These technologies are simple, inexpensive, and fast for repeated logins. However, these technologies are still subject to assaults like smudge assaults and shoulder surfing. Users’ touch behavior while using their cell phones might be used to authenticate them, which would solve the problem. The performance of the authentication process may be influenced by the attributes chosen (from these behaviors). The purpose of this study is to present an… More >

Displaying 21-30 on page 3 of 110. Per Page