Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (233)
  • Open Access

    ARTICLE

    Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection

    Mohammad Yamin1,*, Saleh Bajaba2, Zenah Mahmoud AlKubaisy1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6101-6118, 2023, DOI:10.32604/cmc.2023.033677

    Abstract Cloud Computing (CC) provides data storage options as well as computing services to its users through the Internet. On the other hand, cloud users are concerned about security and privacy issues due to the increased number of cyberattacks. Data protection has become an important issue since the users’ information gets exposed to third parties. Computer networks are exposed to different types of attacks which have extensively grown in addition to the novel intrusion methods and hacking tools. Intrusion Detection Systems (IDSs) can be used in a network to manage suspicious activities. These IDSs monitor the activities of the CC environment… More >

  • Open Access

    ARTICLE

    Feature-Limited Prediction on the UCI Heart Disease Dataset

    Khadijah Mohammad Alfadli, Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5871-5883, 2023, DOI:10.32604/cmc.2023.033603

    Abstract Heart diseases are the undisputed leading causes of death globally. Unfortunately, the conventional approach of relying solely on the patient’s medical history is not enough to reliably diagnose heart issues. Several potentially indicative factors exist, such as abnormal pulse rate, high blood pressure, diabetes, high cholesterol, etc. Manually analyzing these health signals’ interactions is challenging and requires years of medical training and experience. Therefore, this work aims to harness machine learning techniques that have proved helpful for data-driven applications in the rise of the artificial intelligence era. More specifically, this paper builds a hybrid model as a tool for data… More >

  • Open Access

    ARTICLE

    Automated Autism Spectral Disorder Classification Using Optimal Machine Learning Model

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5251-5265, 2023, DOI:10.32604/cmc.2023.032729

    Abstract Autism Spectrum Disorder (ASD) refers to a neuro-disorder where an individual has long-lasting effects on communication and interaction with others. Advanced information technology which employs artificial intelligence (AI) model has assisted in early identify ASD by using pattern detection. Recent advances of AI models assist in the automated identification and classification of ASD, which helps to reduce the severity of the disease. This study introduces an automated ASD classification using owl search algorithm with machine learning (ASDC-OSAML) model. The proposed ASDC-OSAML model majorly focuses on the identification and classification of ASD. To attain this, the presented ASDC-OSAML model follows min-max… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Cardio Vascular Disease Prediction Using Binarized Butterfly Optimization

    S. Amutha*, J. Raja Sekar

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1863-1880, 2023, DOI:10.32604/iasc.2023.028903

    Abstract In this digital era, Cardio Vascular Disease (CVD) has become the leading cause of death which has led to the mortality of 17.9 million lives each year. Earlier Diagnosis of the people who are at higher risk of CVDs helps them to receive proper treatment and helps prevent deaths. It becomes inevitable to propose a solution to predict the CVD with high accuracy. A system for predicting Cardio Vascular Disease using Deep Neural Network with Binarized Butterfly Optimization Algorithm (DNN–BBoA) is proposed. The BBoA is incorporated to select the best features. The optimal features are fed to the deep neural… More >

  • Open Access

    ARTICLE

    Breast Cancer Diagnosis Using Feature Selection Approaches and Bayesian Optimization

    Erkan Akkur1, Fuat TURK2,*, Osman Erogul1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1017-1031, 2023, DOI:10.32604/csse.2023.033003

    Abstract Breast cancer seriously affects many women. If breast cancer is detected at an early stage, it may be cured. This paper proposes a novel classification model based improved machine learning algorithms for diagnosis of breast cancer at its initial stage. It has been used by combining feature selection and Bayesian optimization approaches to build improved machine learning models. Support Vector Machine, K-Nearest Neighbor, Naive Bayes, Ensemble Learning and Decision Tree approaches were used as machine learning algorithms. All experiments were tested on two different datasets, which are Wisconsin Breast Cancer Dataset (WBCD) and Mammographic Breast Cancer Dataset (MBCD). Experiments were… More >

  • Open Access

    ARTICLE

    Hybrid of Distributed Cumulative Histograms and Classification Model for Attack Detection

    Mostafa Nassar1, Anas M. Ali1,2, Walid El-Shafai1,3, Adel Saleeb1, Fathi E. Abd El-Samie1, Naglaa F. Soliman4, Hussah Nasser AlEisa5,*, Hossam Eldin H. Ahmed1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2235-2247, 2023, DOI:10.32604/csse.2023.032156

    Abstract Traditional security systems are exposed to many various attacks, which represents a major challenge for the spread of the Internet in the future. Innovative techniques have been suggested for detecting attacks using machine learning and deep learning. The significant advantage of deep learning is that it is highly efficient, but it needs a large training time with a lot of data. Therefore, in this paper, we present a new feature reduction strategy based on Distributed Cumulative Histograms (DCH) to distinguish between dataset features to locate the most effective features. Cumulative histograms assess the dataset instance patterns of the applied features… More >

  • Open Access

    ARTICLE

    Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram

    Doaa Sami Khafaga1, Amel Ali Alhussan1,*, Abdelaziz A. Abdelhamid2,3, Abdelhameed Ibrahim4, Mohamed Saber5, El-Sayed M. El-kenawy6,7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1469-1482, 2023, DOI:10.32604/csse.2023.031943

    Abstract Arrhythmia has been classified using a variety of methods. Because of the dynamic nature of electrocardiogram (ECG) data, traditional handcrafted approaches are difficult to execute, making the machine learning (ML) solutions more appealing. Patients with cardiac arrhythmias can benefit from competent monitoring to save their lives. Cardiac arrhythmia classification and prediction have greatly improved in recent years. Arrhythmias are a category of conditions in which the heart's electrical activity is abnormally rapid or sluggish. Every year, it is one of the main reasons of mortality for both men and women, worldwide. For the classification of arrhythmias, this work proposes a… More >

  • Open Access

    ARTICLE

    Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics

    M. Priyadharsini1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2187-2205, 2023, DOI:10.32604/csse.2023.031115

    Abstract Big Data applications face different types of complexities in classifications. Cleaning and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed data. The existing scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. Recently ensemble methods have made a mark in classification tasks as combine multiple results into a single representation. When comparing to a single model, this technique offers for improved prediction. Ensemble based feature selections parallel multiple expert’s judgments on a… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model

    Mashael M Asiri1, Heba G. Mohamed2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Amira Sayed A. Aziz5, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Mohamed I. Eldesouki7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1679-1694, 2023, DOI:10.32604/csse.2023.031063

    Abstract Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention in different application areas. However, IoT environment is highly susceptible to cyber-attacks because of memory, processing, and communication restrictions. Since traditional models are not adequate for accomplishing security in the IoT environment, the recent developments of deep learning (DL) models find beneficial. This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection (HMFS-SDLCAD) model. The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT environment. At… More >

  • Open Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669

    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive… More >

Displaying 71-80 on page 8 of 233. Per Page