Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification

    Adil Hussain1, Amna Khatoon2,*, Ayesha Aslam2, Tariq1, Muhammad Asif Khosa1

    Journal of Cyber Security, Vol.6, pp. 1-23, 2024, DOI:10.32604/jcs.2023.046915

    Abstract The importance of cybersecurity in contemporary society cannot be inflated, given the substantial impact of networks on various aspects of daily life. Traditional cybersecurity measures, such as anti-virus software and firewalls, safeguard networks against potential threats. In network security, using Intrusion Detection Systems (IDSs) is vital for effectively monitoring the various software and hardware components inside a given network. However, they may encounter difficulties when it comes to detecting solitary attacks. Machine Learning (ML) models are implemented in intrusion detection widely because of the high accuracy. The present work aims to assess the performance of machine learning algorithms in the… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Machine Learning Models for PDF Malware Detection: Evaluating Different Training and Testing Criteria

    Bilal Khan1, Muhammad Arshad2, Sarwar Shah Khan3,4,*

    Journal of Cyber Security, Vol.5, pp. 1-11, 2023, DOI:10.32604/jcs.2023.042501

    Abstract The proliferation of maliciously coded documents as file transfers increase has led to a rise in sophisticated attacks. Portable Document Format (PDF) files have emerged as a major attack vector for malware due to their adaptability and wide usage. Detecting malware in PDF files is challenging due to its ability to include various harmful elements such as embedded scripts, exploits, and malicious URLs. This paper presents a comparative analysis of machine learning (ML) techniques, including Naive Bayes (NB), K-Nearest Neighbor (KNN), Average One Dependency Estimator (A1DE), Random Forest (RF), and Support Vector Machine (SVM) for PDF malware detection. The study… More >

  • Open Access

    ARTICLE

    Modeling and Validation of Base Pressure for Aerodynamic Vehicles Based on Machine Learning Models

    Jaimon Dennis Quadros1, Sher Afghan Khan2, Abdul Aabid3,*, Muneer Baig3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2331-2352, 2023, DOI:10.32604/cmes.2023.028925

    Abstract The application of abruptly enlarged flows to adjust the drag of aerodynamic vehicles using machine learning models has not been investigated previously. The process variables (Mach number (M), nozzle pressure ratio (η), area ratio (α), and length to diameter ratio (γ )) were numerically explored to address several aspects of this process, namely base pressure (β) and base pressure with cavity (βcav). In this work, the optimal base pressure is determined using the PCA-BAS-ENN based algorithm to modify the base pressure presetting accuracy, thereby regulating the base drag required for smooth flow of aerodynamic vehicles. Based on the identical dataset,… More > Graphic Abstract

    Modeling and Validation of Base Pressure for Aerodynamic Vehicles Based on Machine Learning Models

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations between them. This problem can… More >

  • Open Access

    ARTICLE

    Energy Prediction in IoT Systems Using Machine Learning Models

    S. Balaji*, S. Karthik

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 443-459, 2023, DOI:10.32604/cmc.2023.035275

    Abstract The Internet of Things (IoT) technology has been developed for directing and maintaining the atmosphere in smart buildings in real time. In order to optimise the power generation sector and schedule routine maintenance, it is crucial to predict future energy demand. Electricity demand forecasting is difficult because of the complexity of the available demand patterns. Establishing a perfect prediction of energy consumption at the building’s level is vital and significant to efficiently managing the consumed energy by utilising a strong predictive model. Low forecast accuracy is just one of the reasons why energy consumption and prediction models have failed to… More >

  • Open Access

    ARTICLE

    Prediction of Outcomes in Mini-Basketball Training Program for Preschool Children with Autism Using Machine Learning Models

    Zhiyuan Sun1,2, Fabian Herold3,4, Kelong Cai1,2, Qian Yu5, Xiaoxiao Dong1,2, Zhimei Liu1,2, Jinming Li6, Aiguo Chen1,2,* , Liye Zou7,*

    International Journal of Mental Health Promotion, Vol.24, No.2, pp. 143-158, 2022, DOI:10.32604/ijmhp.2022.020075

    Abstract In recent years evidence has emerged suggesting that Mini-basketball training program (MBTP) can be an effective intervention method to improve social communication (SC) impairments and restricted and repetitive behaviors (RRBs) in preschool children suffering from autism spectrum disorder (ASD). However, there is a considerable degree if interindividual variability concerning these social outcomes and thus not all preschool children with ASD profit from a MBTP intervention to the same extent. In order to make more accurate predictions which preschool children with ASD can benefit from an MBTP intervention or which preschool children with ASD need additional interventions to achieve behavioral improvements,… More >

  • Open Access

    ARTICLE

    Inferential Statistics and Machine Learning Models for Short-Term Wind Power Forecasting

    Ming Zhang, Hongbo Li, Xing Deng*

    Energy Engineering, Vol.119, No.1, pp. 237-252, 2022, DOI:10.32604/EE.2022.017916

    Abstract The inherent randomness, intermittence and volatility of wind power generation compromise the quality of the wind power system, resulting in uncertainty in the system's optimal scheduling. As a result, it's critical to improve power quality and assure real-time power grid scheduling and grid-connected wind farm operation. Inferred statistics are utilized in this research to infer general features based on the selected information, confirming that there are differences between two forecasting categories: Forecast Category 1 (0–11 h ahead) and Forecast Category 2 (12–23 h ahead). In z-tests, the null hypothesis provides the corresponding quantitative findings. To verify the final performance of… More >

  • Open Access

    ARTICLE

    Towards Securing Machine Learning Models Against Membership Inference Attacks

    Sana Ben Hamida1,2, Hichem Mrabet3,4, Sana Belguith5,*, Adeeb Alhomoud6, Abderrazak Jemai7

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4897-4919, 2022, DOI:10.32604/cmc.2022.019709

    Abstract From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress… More >

  • Open Access

    ARTICLE

    Impact Assessment of COVID-19 Pandemic Through Machine Learning Models

    Fawaz Jaber Alsolami1, Abdullah Saad Al-Malaise ALGhamdi2, Asif Irshad Khan1,*, Yoosef B. Abushark1, Abdulmohsen Almalawi1, Farrukh Saleem2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2895-2912, 2021, DOI:10.32604/cmc.2021.017469

    Abstract Ever since its outbreak in the Wuhan city of China, COVID-19 pandemic has engulfed more than 211 countries in the world, leaving a trail of unprecedented fatalities. Even more debilitating than the infection itself, were the restrictions like lockdowns and quarantine measures taken to contain the spread of Coronavirus. Such enforced alienation affected both the mental and social condition of people significantly. Social interactions and congregations are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to enthuse the fervor… More >

  • Open Access

    ARTICLE

    Experimental Evaluation of Clickbait Detection Using Machine Learning Models

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Abdullah Tariq1

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1335-1344, 2020, DOI:10.32604/iasc.2020.013861

    Abstract The exponential growth of social media has been instrumental in directing the news outlets to rely on the stated platform for the dissemination of news stories. While social media has helped in the fast propagation of breaking news, it also has allowed many bad actors to exploit this medium for political and monetary purposes. With such an intention, tempting headlines, which are not aligned with the content, are being used to lure users to visit the websites that often post dodgy and unreliable information. This phenomenon is commonly known as clickbait. A number of machine learning techniques have been developed… More >

Displaying 1-10 on page 1 of 12. Per Page