Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (243)
  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here… More >

  • Open Access

    ARTICLE

    BFS-SVM Classifier for QoS and Resource Allocation in Cloud Environment

    A. Richard William1,*, J. Senthilkumar2, Y. Suresh2, V. Mohanraj2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 777-790, 2023, DOI:10.32604/csse.2023.031753

    Abstract In cloud computing Resource allocation is a very complex task. Handling the customer demand makes the challenges of on-demand resource allocation. Many challenges are faced by conventional methods for resource allocation in order to meet the Quality of Service (QoS) requirements of users. For solving the about said problems a new method was implemented with the utility of machine learning framework of resource allocation by utilizing the cloud computing technique was taken in to an account in this research work. The accuracy in the machine learning algorithm can be improved by introducing Bat Algorithm with… More >

  • Open Access

    ARTICLE

    A New Hybrid Feature Selection Sequence for Predicting Breast Cancer Survivability Using Clinical Datasets

    E. Jenifer Sweetlin*, S. Saudia

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 343-367, 2023, DOI:10.32604/iasc.2023.036742

    Abstract This paper proposes a hybrid feature selection sequence complemented with filter and wrapper concepts to improve the accuracy of Machine Learning (ML) based supervised classifiers for classifying the survivability of breast cancer patients into classes, living and deceased using METABRIC and Surveillance, Epidemiology and End Results (SEER) datasets. The ML-based classifiers used in the analysis are: Multiple Logistic Regression, K-Nearest Neighbors, Decision Tree, Random Forest, Support Vector Machine and Multilayer Perceptron. The workflow of the proposed ML algorithm sequence comprises the following stages: data cleaning, data balancing, feature selection via a filter and wrapper sequence, More >

  • Open Access

    ARTICLE

    An Efficient Approach Based on Remora Optimization Algorithm and Levy Flight for Intrusion Detection

    Abdullah Mujawib Alashjaee*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 235-254, 2023, DOI:10.32604/iasc.2023.036247

    Abstract With the recent increase in network attacks by threats, malware, and other sources, machine learning techniques have gained special attention for intrusion detection due to their ability to classify hundreds of features into normal system behavior or an attack attempt. However, feature selection is a vital preprocessing stage in machine learning approaches. This paper presents a novel feature selection-based approach, Remora Optimization Algorithm-Levy Flight (ROA-LF), to improve intrusion detection by boosting the ROA performance with LF. The developed ROA-LF is assessed using several evaluation measures on five publicly available datasets for intrusion detection: Knowledge discovery More >

  • Open Access

    ARTICLE

    Human Gait Recognition Based on Sequential Deep Learning and Best Features Selection

    Ch Avais Hanif1, Muhammad Ali Mughal1,*, Muhammad Attique Khan2, Usman Tariq3, Ye Jin Kim4, Jae-Hyuk Cha4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5123-5140, 2023, DOI:10.32604/cmc.2023.038120

    Abstract Gait recognition is an active research area that uses a walking theme to identify the subject correctly. Human Gait Recognition (HGR) is performed without any cooperation from the individual. However, in practice, it remains a challenging task under diverse walking sequences due to the covariant factors such as normal walking and walking with wearing a coat. Researchers, over the years, have worked on successfully identifying subjects using different techniques, but there is still room for improvement in accuracy due to these covariant factors. This paper proposes an automated model-free framework for human gait recognition in this… More >

  • Open Access

    ARTICLE

    Managing Health Treatment by Optimizing Complex Lab-Developed Test Configurations: A Health Informatics Perspective

    Uzma Afzal1, Tariq Mahmood2, Ali Mustafa Qamar3,*, Ayaz H. Khan4,5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6251-6267, 2023, DOI:10.32604/cmc.2023.037653

    Abstract A complex Laboratory Developed Test (LDT) is a clinical test developed within a single laboratory. It is typically configured from many feature constraints from clinical repositories, which are part of the existing Laboratory Information Management System (LIMS). Although these clinical repositories are automated, support for managing patient information with test results of an LDT is also integrated within the existing LIMS. Still, the support to configure LDTs design needs to be made available even in standard LIMS packages. The manual configuration of LDTs is a complex process and can generate configuration inconsistencies because many constraints… More >

  • Open Access

    ARTICLE

    MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection

    Zhanyang Xu1, Jianchun Cheng1,*, Luofei Cheng1, Xiaolong Xu1,2, Muhammad Bilal3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5573-5595, 2023, DOI:10.32604/cmc.2023.037287

    Abstract Federated learning has been used extensively in business innovation scenarios in various industries. This research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asymmetry in the credit assessment scenario. First, this research designs a credit risk assessment model based on federated learning and feature selection for micro and small enterprises (MSEs) using multi-dimensional enterprise data and multi-perspective enterprise information. The proposed model includes four main processes: namely encrypted entity alignment, hybrid feature selection, secure multi-party computation, and global model updating. Secondly, a two-step feature selection algorithm based… More >

  • Open Access

    ARTICLE

    Feature Selection with Deep Reinforcement Learning for Intrusion Detection System

    S. Priya1,*, K. Pradeep Mohan Kumar2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3339-3353, 2023, DOI:10.32604/csse.2023.030630

    Abstract An intrusion detection system (IDS) becomes an important tool for ensuring security in the network. In recent times, machine learning (ML) and deep learning (DL) models can be applied for the identification of intrusions over the network effectively. To resolve the security issues, this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique, called BBOFS-DRL for intrusion detection. The proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the network. To attain this, the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations More >

  • Open Access

    ARTICLE

    Multi-Strategy Boosted Spider Monkey Optimization Algorithm for Feature Selection

    Jianguo Zheng, Shuilin Chen*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3619-3635, 2023, DOI:10.32604/csse.2023.038025

    Abstract To solve the problem of slow convergence and easy to get into the local optimum of the spider monkey optimization algorithm, this paper presents a new algorithm based on multi-strategy (ISMO). First, the initial population is generated by a refracted opposition-based learning strategy to enhance diversity and ergodicity. Second, this paper introduces a non-linear adaptive dynamic weight factor to improve convergence efficiency. Then, using the crisscross strategy, using the horizontal crossover to enhance the global search and vertical crossover to keep the diversity of the population to avoid being trapped in the local optimum. At More >

Displaying 41-50 on page 5 of 243. Per Page