Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (102)
  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368 - 19 July 2022

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. More >

  • Open Access

    ARTICLE

    Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography

    K. Saranya*, K. Premalatha

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2029-2042, 2023, DOI:10.32604/iasc.2023.027949 - 19 July 2022

    Abstract Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy. In this background, several authentication and accessibility issues emerge with an intention to protect the sensitive details of the patients over getting published in open domain. To solve this problem, Multi Attribute Case based Privacy Preservation (MACPP) technique is proposed in this study to enhance the security of privacy-preserving data. Private information can be any attribute information which is categorized as sensitive logs in a patient’s records. The semantic relation between transactional More >

  • Open Access

    ARTICLE

    Optimized Deep Learning Methods for Crop Yield Prediction

    K. Vignesh1,*, A. Askarunisa2, A. M. Abirami3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1051-1067, 2023, DOI:10.32604/csse.2023.024475 - 15 June 2022

    Abstract Crop yield has been predicted using environmental, land, water, and crop characteristics in a prospective research design. When it comes to predicting crop production, there are a number of factors to consider, including weather conditions, soil qualities, water levels and the location of the farm. A broad variety of algorithms based on deep learning are used to extract useful crops for forecasting. The combination of data mining and deep learning creates a whole crop yield prediction system that is able to connect raw data to predicted crop yields. The suggested study uses a Discrete Deep… More >

  • Open Access

    ARTICLE

    Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography

    B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 839-851, 2023, DOI:10.32604/iasc.2023.028548 - 06 June 2022

    Abstract Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic More >

  • Open Access

    ARTICLE

    Research on Electricity Consumption Model of Library Building Based on Data Mining

    Jiaming Dou1, Hongyan Ma1,2,3,*, Rong Guo1

    Energy Engineering, Vol.119, No.6, pp. 2407-2429, 2022, DOI:10.32604/ee.2022.019654 - 14 September 2022

    Abstract With the exponential development of Chinese population, the massive energy consumption of buildings has recently become an interest subject. Although much research has been conducted on residential buildings, heating ventilation and air conditioning (HVAC), little research has been conducted on the relationship between student’s behavior, campus buildings, and their subsystems. Using classical seasonal decomposition, hierarchical clustering, and apriori algorithm, this paper aims to provide an empirical model for consumption data in campus library. Smart meter data from a library in Beijing, China, is adopted in this paper. Building electricity consumption patterns are investigated on an… More >

  • Open Access

    ARTICLE

    Data Mining Based Integrated Electric-Gas Energy System Multi-Objective Optimization

    Zhukui Tan1,*, Yongjie Ren1, Hua Li1, Weili Ren2, Xichao Zhou2, Ming Zeng1

    Energy Engineering, Vol.119, No.6, pp. 2607-2619, 2022, DOI:10.32604/ee.2022.019550 - 14 September 2022

    Abstract With the proposal of carbon neutrality, how to improve the proportion of clean energy in energy consumption and reduce carbon dioxide emissions has become the important challenge for the traditional energy industry. Based on the idea of multi-energy complementarity, a typical integrated energy system consisting of electric system and gas system is constructed based on the application of power to gas (P2G) technology and gas turbine in this paper. Furthermore, a multi-objective optimization model with economic improvement, carbon emission reduction and peak-load shifting as objectives is proposed, and solved by BSO algorithm. Finally, a typical More >

  • Open Access

    ARTICLE

    URL Phishing Detection Using Particle Swarm Optimization and Data Mining

    Saeed M. Alshahrani1, Nayyar Ahmed Khan1,*, Jameel Almalki2, Waleed Al Shehri2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5625-5640, 2022, DOI:10.32604/cmc.2022.030982 - 28 July 2022

    Abstract The continuous destruction and frauds prevailing due to phishing URLs make it an indispensable area for research. Various techniques are adopted in the detection process, including neural networks, machine learning, or hybrid techniques. A novel detection model is proposed that uses data mining with the Particle Swarm Optimization technique (PSO) to increase and empower the method of detecting phishing URLs. Feature selection based on various techniques to identify the phishing candidates from the URL is conducted. In this approach, the features mined from the URL are extracted using data mining rules. The features are selected… More >

  • Open Access

    ARTICLE

    Development of Data Mining Models Based on Features Ranks Voting (FRV)

    Mofreh A. Hogo*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2947-2966, 2022, DOI:10.32604/cmc.2022.027300 - 16 June 2022

    Abstract Data size plays a significant role in the design and the performance of data mining models. A good feature selection algorithm reduces the problems of big data size and noise due to data redundancy. Features selection algorithms aim at selecting the best features and eliminating unnecessary ones, which in turn simplifies the structure of the data mining model as well as increases its performance. This paper introduces a robust features selection algorithm, named Features Ranking Voting Algorithm FRV. It merges the benefits of the different features selection algorithms to specify the features ranks in the… More >

  • Open Access

    ARTICLE

    Metaheuristics with Machine Learning Enabled Information Security on Cloud Environment

    Haya Mesfer Alshahrani1, Faisal S. Alsubaei2, Taiseer Abdalla Elfadil Eisa3, Mohamed K. Nour4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1557-1570, 2022, DOI:10.32604/cmc.2022.027135 - 18 May 2022

    Abstract The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment. Cloud computing (CC) is used for storing as well as processing data. Therefore, security becomes important as the CC handles massive quantity of outsourced, and unprotected sensitive data for public access. This study introduces a novel chaotic chimp optimization with machine learning enabled information security (CCOML-IS) technique on cloud environment. The proposed CCOML-IS technique aims to accomplish maximum security in the CC environment by the identification of intrusions or anomalies in the network.… More >

  • Open Access

    ARTICLE

    Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning

    Jiaming Wang2, Xiaolan Xie1,2,*, Xiaochun Cheng3, Yuhan Wang2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 997-1008, 2022, DOI:10.32604/csse.2022.027005 - 09 May 2022

    Abstract

    There is a large amount of information in the network data that we can exploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of network data is usually paired with clustering algorithms to solve the community detection problem. Meanwhile, there is always an unpredictable distribution of class clusters output by graph representation learning. Therefore, we propose an improved density peak clustering algorithm (ILDPC) for the community detection problem, which improves the local density mechanism in the original algorithm and can better accommodate class clusters of different

    More >

Displaying 41-50 on page 5 of 102. Per Page