Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    Ghalib H. Alshammri1,2, Amani K. Samha3, Ezz El-Din Hemdan4, Mohammed Amoon1,4, Walid El-Shafai5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3529-3548, 2022, DOI:10.32604/cmc.2022.025262

    Abstract Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms.… More >

  • Open Access

    ARTICLE

    Medical Data Clustering and Classification Using TLBO and Machine Learning Algorithms

    Ashutosh Kumar Dubey1,*, Umesh Gupta2, Sonal Jain2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4523-4543, 2022, DOI:10.32604/cmc.2022.021148

    Abstract This study aims to empirically analyze teaching-learning-based optimization (TLBO) and machine learning algorithms using k-means and fuzzy c-means (FCM) algorithms for their individual performance evaluation in terms of clustering and classification. In the first phase, the clustering (k-means and FCM) algorithms were employed independently and the clustering accuracy was evaluated using different computational measures. During the second phase, the non-clustered data obtained from the first phase were preprocessed with TLBO. TLBO was performed using k-means (TLBO-KM) and FCM (TLBO-FCM) (TLBO-KM/FCM) algorithms. The objective function was determined by considering both minimization and maximization criteria. Non-clustered data obtained from the first phase… More >

Displaying 1-10 on page 1 of 2. Per Page