Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (231)
  • Open Access

    ARTICLE

    Evolutionary Algorithm Based Feature Subset Selection for Students Academic Performance Analysis

    Ierin Babu1,*, R. MathuSoothana2, S. Kumar2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3621-3636, 2023, DOI:10.32604/iasc.2023.033791

    Abstract Educational Data Mining (EDM) is an emergent discipline that concentrates on the design of self-learning and adaptive approaches. Higher education institutions have started to utilize analytical tools to improve students’ grades and retention. Prediction of students’ performance is a difficult process owing to the massive quantity of educational data. Therefore, Artificial Intelligence (AI) techniques can be used for educational data mining in a big data environment. At the same time, in EDM, the feature selection process becomes necessary in creation of feature subsets. Since the feature selection performance affects the predictive performance of any model, it is important to elaborately… More >

  • Open Access

    ARTICLE

    Framework for a Computer-Aided Treatment Prediction (CATP) System for Breast Cancer

    Emad Abd Al Rahman1, Nur Intan Raihana Ruhaiyem1,*, Majed Bouchahma2, Kamarul Imran Musa3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3007-3028, 2023, DOI:10.32604/iasc.2023.032580

    Abstract This study offers a framework for a breast cancer computer-aided treatment prediction (CATP) system. The rising death rate among women due to breast cancer is a worldwide health concern that can only be addressed by early diagnosis and frequent screening. Mammography has been the most utilized breast imaging technique to date. Radiologists have begun to use computer-aided detection and diagnosis (CAD) systems to improve the accuracy of breast cancer diagnosis by minimizing human errors. Despite the progress of artificial intelligence (AI) in the medical field, this study indicates that systems that can anticipate a treatment plan once a patient has… More >

  • Open Access

    ARTICLE

    An Improved Reptile Search Algorithm Based on Cauchy Mutation for Intrusion Detection

    Salahahaldeen Duraibi*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2509-2525, 2023, DOI:10.32604/csse.2023.036119

    Abstract With the growth of the discipline of digital communication, the topic has acquired more attention in the cybersecurity medium. The Intrusion Detection (ID) system monitors network traffic to detect malicious activities. The paper introduces a novel Feature Selection (FS) approach for ID. Reptile Search Algorithm (RSA)—is a new optimization algorithm; in this method, each agent searches a new region according to the position of the host, which makes the algorithm suffers from getting stuck in local optima and a slow convergence rate. To overcome these problems, this study introduces an improved RSA approach by integrating Cauchy Mutation (CM) into the… More >

  • Open Access

    ARTICLE

    Artificial Algae Optimization with Deep Belief Network Enabled Ransomware Detection in IoT Environment

    Mesfer Al Duhayyim1,*, Heba G. Mohamed2, Fadwa Alrowais3, Fahd N. Al-Wesabi4, Anwer Mustafa Hilal5, Abdelwahed Motwakel5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1293-1310, 2023, DOI:10.32604/csse.2023.035589

    Abstract The Internet of Things (IoT) has gained more popularity in research because of its large-scale challenges and implementation. But security was the main concern when witnessing the fast development in its applications and size. It was a dreary task to independently set security systems in every IoT gadget and upgrade them according to the newer threats. Additionally, machine learning (ML) techniques optimally use a colossal volume of data generated by IoT devices. Deep Learning (DL) related systems were modelled for attack detection in IoT. But the current security systems address restricted attacks and can be utilized outdated datasets for evaluations.… More >

  • Open Access

    ARTICLE

    Modified Garden Balsan Optimization Based Machine Learning for Intrusion Detection

    Mesfer Al Duhayyim1,*, Jaber S. Alzahrani2, Hanan Abdullah Mengash3, Mrim M. Alnfiai4, Radwa Marzouk3, Gouse Pasha Mohammed5, Mohammed Rizwanullah5, Amgad Atta Abdelmageed5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1471-1485, 2023, DOI:10.32604/csse.2023.034137

    Abstract The Internet of Things (IoT) environment plays a crucial role in the design of smart environments. Security and privacy are the major challenging problems that exist in the design of IoT-enabled real-time environments. Security susceptibilities in IoT-based systems pose security threats which affect smart environment applications. Intrusion detection systems (IDS) can be used for IoT environments to mitigate IoT-related security attacks which use few security vulnerabilities. This paper introduces a modified garden balsan optimization-based machine learning model for intrusion detection (MGBO-MLID) in the IoT cloud environment. The presented MGBO-MLID technique focuses on the identification and classification of intrusions in the… More >

  • Open Access

    ARTICLE

    Optimal Hybrid Deep Learning Enabled Attack Detection and Classification in IoT Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 99-115, 2023, DOI:10.32604/cmc.2023.034752

    Abstract The Internet of Things (IoT) paradigm enables end users to access networking services amongst diverse kinds of electronic devices. IoT security mechanism is a technology that concentrates on safeguarding the devices and networks connected in the IoT environment. In recent years, False Data Injection Attacks (FDIAs) have gained considerable interest in the IoT environment. Cybercriminals compromise the devices connected to the network and inject the data. Such attacks on the IoT environment can result in a considerable loss and interrupt normal activities among the IoT network devices. The FDI attacks have been effectively overcome so far by conventional threat detection… More >

  • Open Access

    ARTICLE

    Improved Whale Optimization with Local-Search Method for Feature Selection

    Malek Alzaqebah1,2,*, Mutasem K. Alsmadi3, Sana Jawarneh4, Jehad Saad Alqurni5, Mohammed Tayfour3, Ibrahim Almarashdeh3, Rami Mustafa A. Mohammad6, Fahad A. Alghamdi3, Nahier Aldhafferi6, Abdullah Alqahtani6, Khalid A. Alissa7, Bashar A. Aldeeb8, Usama A. Badawi3, Maram Alwohaibi1,2, Hayat Alfagham3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1371-1389, 2023, DOI:10.32604/cmc.2023.033509

    Abstract Various feature selection algorithms are usually employed to improve classification models’ overall performance. Optimization algorithms typically accompany such algorithms to select the optimal set of features. Among the most currently attractive trends within optimization algorithms are hybrid metaheuristics. The present paper presents two Stages of Local Search models for feature selection based on WOA (Whale Optimization Algorithm) and Great Deluge (GD). GD Algorithm is integrated with the WOA algorithm to improve exploitation by identifying the most promising regions during the search. Another version is employed using the best solution found by the WOA algorithm and exploited by the GD algorithm.… More >

  • Open Access

    ARTICLE

    Adaptive Dynamic Dipper Throated Optimization for Feature Selection in Medical Data

    Ghada Atteia1, El-Sayed M. El-kenawy2,3, Nagwan Abdel Samee1,*, Mona M. Jamjoom4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, Ahmad Taher Azar8,9, Nima Khodadadi10,11, Reham A. Ghanem12, Mahmoud Y. Shams13

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1883-1900, 2023, DOI:10.32604/cmc.2023.031723

    Abstract The rapid population growth results in a crucial problem in the early detection of diseases in medical research. Among all the cancers unveiled, breast cancer is considered the second most severe cancer. Consequently, an exponential rising in death cases incurred by breast cancer is expected due to the rapid population growth and the lack of resources required for performing medical diagnoses. Utilizing recent advances in machine learning could help medical staff in diagnosing diseases as they offer effective, reliable, and rapid responses, which could help in decreasing the death risk. In this paper, we propose a new algorithm for feature… More >

  • Open Access

    ARTICLE

    An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model

    Muhammad Zia Ur Rehman1, Jawad Ahmad2,*, Emad Sami Jaha3, Abdullah Marish Ali3, Mohammed A. Alzain4, Faisal Saeed5

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 897-911, 2023, DOI:10.32604/csse.2023.035382

    Abstract Breast cancer is one of the leading cancers among women. It has the second-highest mortality rate in women after lung cancer. Timely detection, especially in the early stages, can help increase survival rates. However, manual diagnosis of breast cancer is a tedious and time-consuming process, and the accuracy of detection is reliant on the quality of the images and the radiologist’s experience. However, computer-aided medical diagnosis has recently shown promising results, leading to the need to develop an efficient system that can aid radiologists in diagnosing breast cancer in its early stages. The research presented in this paper is focused… More >

  • Open Access

    ARTICLE

    Automated White Blood Cell Disease Recognition Using Lightweight Deep Learning

    Abdullah Alqahtani1, Shtwai Alsubai1, Mohemmed Sha1,*, Muhammad Attique Khan2, Majed Alhaisoni3, Syed Rameez Naqvi2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 107-123, 2023, DOI:10.32604/csse.2023.030727

    Abstract White blood cells (WBC) are immune system cells, which is why they are also known as immune cells. They protect the human body from a variety of dangerous diseases and outside invaders. The majority of WBCs come from red bone marrow, although some come from other important organs in the body. Because manual diagnosis of blood disorders is difficult, it is necessary to design a computerized technique. Researchers have introduced various automated strategies in recent years, but they still face several obstacles, such as imbalanced datasets, incorrect feature selection, and incorrect deep model selection. We proposed an automated deep learning… More >

Displaying 51-60 on page 6 of 231. Per Page