Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique

    Yih Bing Chu*, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta

    Journal of Cyber Security, Vol.5, pp. 33-46, 2023, DOI:10.32604/jcs.2023.045422

    Abstract The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing machine learning models employed. Such… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    An Ensemble Machine Learning Technique for Stroke Prognosis

    Mesfer Al Duhayyim1,*, Sidra Abbas2,*, Abdullah Al Hejaili3, Natalia Kryvinska4, Ahmad Almadhor5, Uzma Ghulam Mohammad6

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 413-429, 2023, DOI:10.32604/csse.2023.037127

    Abstract Stroke is a life-threatening disease usually due to blockage of blood or insufficient blood flow to the brain. It has a tremendous impact on every aspect of life since it is the leading global factor of disability and morbidity. Strokes can range from minor to severe (extensive). Thus, early stroke assessment and treatment can enhance survival rates. Manual prediction is extremely time and resource intensive. Automated prediction methods such as Modern Information and Communication Technologies (ICTs), particularly those in Machine Learning (ML) area, are crucial for the early diagnosis and prognosis of stroke. Therefore, this research proposed an ensemble voting… More >

  • Open Access

    ARTICLE

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

    Mustafa Sami Abdullatef*, Faten N. Alzubaidi, Anees Al-Tamimi, Yasser Ahmed Mahmood

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2083-2107, 2023, DOI:10.32604/fdmp.2023.027266

    Abstract The ongoing effort to create methods for detecting and quantifying fatigue damage is motivated by the high levels of uncertainty in present fatigue-life prediction approaches and the frequently catastrophic nature of fatigue failure. The fatigue life of high strength aluminum alloy 2090-T83 is predicted in this study using a variety of artificial intelligence and machine learning techniques for constant amplitude and negative stress ratios (). Artificial neural networks (ANN), adaptive neuro-fuzzy inference systems (ANFIS), support-vector machines (SVM), a random forest model (RF), and an extreme-gradient tree-boosting model (XGB) are trained using numerical and experimental input data obtained from fatigue tests… More > Graphic Abstract

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

  • Open Access

    ARTICLE

    Network Intrusion Detection Model Using Fused Machine Learning Technique

    Fahad Mazaed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2479-2490, 2023, DOI:10.32604/cmc.2023.033792

    Abstract With the progress of advanced technology in the industrial revolution encompassing the Internet of Things (IoT) and cloud computing, cyberattacks have been increasing rapidly on a large scale. The rapid expansion of IoT and networks in many forms generates massive volumes of data, which are vulnerable to security risks. As a result, cyberattacks have become a prevalent and danger to society, including its infrastructures, economy, and citizens’ privacy, and pose a national security risk worldwide. Therefore, cyber security has become an increasingly important issue across all levels and sectors. Continuous progress is being made in developing more sophisticated and efficient… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One of the online security challenges… More >

  • Open Access

    REVIEW

    A Review of Machine Learning Techniques in Cyberbullying Detection

    Daniyar Sultan1,2,*, Batyrkhan Omarov3, Zhazira Kozhamkulova4, Gulnur Kazbekova5, Laura Alimzhanova1, Aigul Dautbayeva6, Yernar Zholdassov1, Rustam Abdrakhmanov3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5625-5640, 2023, DOI:10.32604/cmc.2023.033682

    Abstract Automatic identification of cyberbullying is a problem that is gaining traction, especially in the Machine Learning areas. Not only is it complicated, but it has also become a pressing necessity, considering how social media has become an integral part of adolescents’ lives and how serious the impacts of cyberbullying and online harassment can be, particularly among teenagers. This paper contains a systematic literature review of modern strategies, machine learning methods, and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet. We undertake an in-depth review of 13 papers from four… More >

  • Open Access

    ARTICLE

    AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique

    Liaqat Ali1, Saif E. A. Alnawayseh2, Mohammed Salahat3, Taher M. Ghazal4,5,*, Mohsen A. A. Tomh6, Beenu Mago7

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1095-1104, 2023, DOI:10.32604/iasc.2023.031335

    Abstract The immediate international spread of severe acute respiratory syndrome revealed the potential threat of infectious diseases in a closely integrated and interdependent world. When an outbreak occurs, each country must have a well-coordinated and preventative plan to address the situation. Information and Communication Technologies have provided innovative approaches to dealing with numerous facets of daily living. Although intelligent devices and applications have become a vital part of our everyday lives, smart gadgets have also led to several physical and psychological health problems in modern society. Here, we used an artificial intelligence AI-based system for disease prediction using an Artificial Neural… More >

  • Open Access

    REVIEW

    Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions

    Gulshan Kumar1,*, Hamed Alqahtani2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 89-119, 2023, DOI:10.32604/cmes.2022.020724

    Abstract Software-Defined Networking (SDN) enables flexibility in developing security tools that can effectively and efficiently analyze and detect malicious network traffic for detecting intrusions. Recently Machine Learning (ML) techniques have attracted lots of attention from researchers and industry for developing intrusion detection systems (IDSs) considering logically centralized control and global view of the network provided by SDN. Many IDSs have developed using advances in machine learning and deep learning. This study presents a comprehensive review of recent work of ML-based IDS in context to SDN. It presents a comprehensive study of the existing review papers in the field. It is followed… More >

  • Open Access

    ARTICLE

    Rock Strength Estimation Using Several Tree-Based ML Techniques

    Zida Liu1, Danial Jahed Armaghani2,*, Pouyan Fakharian3, Diyuan Li4, Dmitrii Vladimirovich Ulrikh5, Natalia Nikolaevna Orekhova6, Khaled Mohamed Khedher7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 799-824, 2022, DOI:10.32604/cmes.2022.021165

    Abstract The uniaxial compressive strength (UCS) of rock is an essential property of rock material in different relevant applications, such as rock slope, tunnel construction, and foundation. It takes enormous time and effort to obtain the UCS values directly in the laboratory. Accordingly, an indirect determination of UCS through conducting several rock index tests that are easy and fast to carry out is of interest and importance. This study presents powerful boosting trees evaluation framework, i.e., adaptive boosting machine, extreme gradient boosting machine (XGBoost), and category gradient boosting machine, for estimating the UCS of sandstone. Schmidt hammer rebound number, P-wave velocity,… More >

Displaying 11-20 on page 2 of 45. Per Page