Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (233)
  • Open Access

    ARTICLE

    Improved Harmony Search with Optimal Deep Learning Enabled Classification Model

    Mahmoud Ragab1,2,3,*, Adel A. Bahaddad4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1783-1797, 2022, DOI:10.32604/cmc.2022.028055

    Abstract Due to drastic increase in the generation of data, it is tedious to examine and derive high level knowledge from the data. The rising trends of high dimension data gathering and problem representation necessitates feature selection process in several machine learning processes. The feature selection procedure establishes a generally encountered issue of global combinatorial optimization. The FS process can lessen the number of features by the removal of unwanted and repetitive data. In this aspect, this article introduces an improved harmony search based global optimization for feature selection with optimal deep learning (IHSFS-ODL) enabled classification model. The proposed IHSFS-ODL technique… More >

  • Open Access

    ARTICLE

    Bio-inspired Hybrid Feature Selection Model for Intrusion Detection

    Adel Hamdan Mohammad1,*, Tariq Alwada’n2, Omar Almomani3, Sami Smadi3, Nidhal ElOmari4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 133-150, 2022, DOI:10.32604/cmc.2022.027475

    Abstract Intrusion detection is a serious and complex problem. Undoubtedly due to a large number of attacks around the world, the concept of intrusion detection has become very important. This research proposes a multilayer bio-inspired feature selection model for intrusion detection using an optimized genetic algorithm. Furthermore, the proposed multilayer model consists of two layers (layers 1 and 2). At layer 1, three algorithms are used for the feature selection. The algorithms used are Particle Swarm Optimization (PSO), Grey Wolf Optimization (GWO), and Firefly Optimization Algorithm (FFA). At the end of layer 1, a priority value will be assigned for each… More >

  • Open Access

    ARTICLE

    An Efficient Ensemble Model for Various Scale Medical Data

    Heba A. Elzeheiry*, Sherief Barakat, Amira Rezk

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1283-1305, 2022, DOI:10.32604/cmc.2022.027345

    Abstract Electronic Health Records (EHRs) are the digital form of patients’ medical reports or records. EHRs facilitate advanced analytics and aid in better decision-making for clinical data. Medical data are very complicated and using one classification algorithm to reach good results is difficult. For this reason, we use a combination of classification techniques to reach an efficient and accurate classification model. This model combination is called the Ensemble model. We need to predict new medical data with a high accuracy value in a small processing time. We propose a new ensemble model MDRL which is efficient with different datasets. The MDRL… More >

  • Open Access

    ARTICLE

    Metaheuristics with Machine Learning Enabled Information Security on Cloud Environment

    Haya Mesfer Alshahrani1, Faisal S. Alsubaei2, Taiseer Abdalla Elfadil Eisa3, Mohamed K. Nour4, Manar Ahmed Hamza5,*, Abdelwahed Motwakel5, Abu Sarwar Zamani5, Ishfaq Yaseen5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1557-1570, 2022, DOI:10.32604/cmc.2022.027135

    Abstract The increasing quantity of sensitive and personal data being gathered by data controllers has raised the security needs in the cloud environment. Cloud computing (CC) is used for storing as well as processing data. Therefore, security becomes important as the CC handles massive quantity of outsourced, and unprotected sensitive data for public access. This study introduces a novel chaotic chimp optimization with machine learning enabled information security (CCOML-IS) technique on cloud environment. The proposed CCOML-IS technique aims to accomplish maximum security in the CC environment by the identification of intrusions or anomalies in the network. The proposed CCOML-IS technique primarily… More >

  • Open Access

    ARTICLE

    Comprehensive DDoS Attack Classification Using Machine Learning Algorithms

    Olga Ussatova1,2, Aidana Zhumabekova1,*, Yenlik Begimbayeva2,3, Eric T. Matson4, Nikita Ussatov5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 577-594, 2022, DOI:10.32604/cmc.2022.026552

    Abstract The fast development of Internet technologies ignited the growth of techniques for information security that protect data, networks, systems, and applications from various threats. There are many types of threats. The dedicated denial of service attack (DDoS) is one of the most serious and widespread attacks on Internet resources. This attack is intended to paralyze the victim's system and cause the service to fail. This work is devoted to the classification of DDoS attacks in the special network environment called Software-Defined Networking (SDN) using machine learning algorithms. The analyzed dataset included instances of two classes: benign and malicious. As the… More >

  • Open Access

    ARTICLE

    Dynamic Selection of Optional Feature for Object Detection

    Jun Wang1, Tingjuan Zhang2,*, Yong Cheng3, Prof Mingshun Jiang4

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 927-940, 2022, DOI:10.32604/iasc.2022.026847

    Abstract To obtain the most intuitive pedestrian target detection results and avoid the impact of motion pose uncertainty on real-time detection, a pedestrian target detection system based on a convolutional neural network was designed. Dynamic Selection of Optional Feature (DSOF) module and a center branch were proposed in this paper, and the target was detected by an anchor-free method. Although almost all the most advanced target detectors use pre-defined anchor boxes to run through the possible positions, scales, and aspect ratios of search targets, their effectualness, and generalization ability are also limited by the anchor boxes. Most anchor-based detectors use heuristically… More >

  • Open Access

    ARTICLE

    Efficient Feature Selection and Machine Learning Based ADHD Detection Using EEG Signal

    Md. Maniruzzaman1, Jungpil Shin1,*, Md. Al Mehedi Hasan1, Akira Yasumura2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5179-5195, 2022, DOI:10.32604/cmc.2022.028339

    Abstract Attention deficit hyperactivity disorder (ADHD) is one of the most common psychiatric and neurobehavioral disorders in children, affecting 11% of children worldwide. This study aimed to propose a machine learning (ML)-based algorithm for discriminating ADHD from healthy children using their electroencephalography (EEG) signals. The study included 61 children with ADHD and 60 healthy children aged 7–12 years. Different morphological and time-domain features were extracted from EEG signals. The t-test (p-value < 0.05) and least absolute shrinkage and selection operator (LASSO) were used to select potential features of children with ADHD and enhance the classification accuracy. The selected potential features were… More >

  • Open Access

    ARTICLE

    Feature Subset Selection with Artificial Intelligence-Based Classification Model for Biomedical Data

    Jaber S. Alzahrani1, Reem M. Alshehri2, Mohammad Alamgeer3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4, Ishfaq Yaseen4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4267-4281, 2022, DOI:10.32604/cmc.2022.027369

    Abstract Recently, medical data classification becomes a hot research topic among healthcare professionals and research communities, which assist in the disease diagnosis and decision making process. The latest developments of artificial intelligence (AI) approaches paves a way for the design of effective medical data classification models. At the same time, the existence of numerous features in the medical dataset poses a curse of dimensionality problem. For resolving the issues, this article introduces a novel feature subset selection with artificial intelligence based classification model for biomedical data (FSS-AICBD) technique. The FSS-AICBD technique intends to derive a useful set of features and thereby… More >

  • Open Access

    ARTICLE

    Assessment of Sentiment Analysis Using Information Gain Based Feature Selection Approach

    R. Madhumathi1,*, A. Meena Kowshalya2, R. Shruthi1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 849-860, 2022, DOI:10.32604/csse.2022.023568

    Abstract Sentiment analysis is the process of determining the intention or emotion behind an article. The subjective information from the context is analyzed by the sentimental analysis of the people’s opinion. The data that is analyzed quantifies the reactions or sentiments and reveals the information’s contextual polarity. In social behavior, sentiment can be thought of as a latent variable. Measuring and comprehending this behavior could help us to better understand the social issues. Because sentiments are domain specific, sentimental analysis in a specific context is critical in any real-world scenario. Textual sentiment analysis is done in sentence, document level and feature… More >

  • Open Access

    ARTICLE

    Binary Representation of Polar Bear Algorithm for Feature Selection

    Amer Mirkhan1, Numan Çelebi2,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 767-783, 2022, DOI:10.32604/csse.2022.023249

    Abstract In most of the scientific research feature selection is a challenge for researcher. Selecting all available features is not an option as it usually complicates the research and leads to performance drop when dealing with large datasets. On the other hand, ignoring some features can compromise the data accuracy. Here the rough set theory presents a good technique to identify the redundant features which can be dismissed without losing any valuable information, however, exploring all possible combinations of features will end with NP-hard problem. In this research we propose adopting a heuristic algorithm to solve this problem, Polar Bear Optimization… More >

Displaying 131-140 on page 14 of 233. Per Page