Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Author’s Age and Gender Prediction on Hotel Review Using Machine Learning Techniques

    Muhammad Hood Khan1, Bilal Khan1,*, Saifullah Jan1, Muhammad Imran Chughtai2

    Journal on Big Data, Vol.5, pp. 41-56, 2023, DOI:10.32604/jbd.2022.044060 - 17 November 2023

    Abstract Author’s Profile (AP) may only be displayed as an article, similar to text collection of material, and must differentiate between gender, age, education, occupation, local language, and relative personality traits. In several information-related fields, including security, forensics, and marketing, and medicine, AP prediction is a significant issue. For instance, it is important to comprehend who wrote the harassing communication. In essence, from a marketing perspective, businesses will get to know one another through examining items and websites on the internet. Accordingly, they will direct their efforts towards a certain gender or age restriction based on… More >

  • Open Access

    ARTICLE

    Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques

    Dana F. Doghramachi1,*, Siddeeq Y. Ameen2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 717-732, 2023, DOI:10.32604/cmc.2023.041186 - 31 October 2023

    Abstract The rapid adoption of the Internet of Things (IoT) across industries has revolutionized daily life by providing essential services and leisure activities. However, the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences. Intrusion Detection Systems (IDS) are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic. The security research community has shown particular interest in leveraging Machine Learning (ML) approaches to develop practical IDS applications for general cyber networks and IoT environments. However, most available datasets related to Industrial IoT suffer from imbalanced class… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection on Original European Credit Card Holder Dataset Using Ensemble Machine Learning Technique

    Yih Bing Chu*, Zhi Min Lim, Bryan Keane, Ping Hao Kong, Ahmed Rafat Elkilany, Osama Hisham Abusetta

    Journal of Cyber Security, Vol.5, pp. 33-46, 2023, DOI:10.32604/jcs.2023.045422 - 03 November 2023

    Abstract The proliferation of digital payment methods facilitated by various online platforms and applications has led to a surge in financial fraud, particularly in credit card transactions. Advanced technologies such as machine learning have been widely employed to enhance the early detection and prevention of losses arising from potentially fraudulent activities. However, a prevalent approach in existing literature involves the use of extensive data sampling and feature selection algorithms as a precursor to subsequent investigations. While sampling techniques can significantly reduce computational time, the resulting dataset relies on generated data and the accuracy of the pre-processing… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687 - 21 June 2023

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). More >

  • Open Access

    ARTICLE

    An Ensemble Machine Learning Technique for Stroke Prognosis

    Mesfer Al Duhayyim1,*, Sidra Abbas2,*, Abdullah Al Hejaili3, Natalia Kryvinska4, Ahmad Almadhor5, Uzma Ghulam Mohammad6

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 413-429, 2023, DOI:10.32604/csse.2023.037127 - 26 May 2023

    Abstract Stroke is a life-threatening disease usually due to blockage of blood or insufficient blood flow to the brain. It has a tremendous impact on every aspect of life since it is the leading global factor of disability and morbidity. Strokes can range from minor to severe (extensive). Thus, early stroke assessment and treatment can enhance survival rates. Manual prediction is extremely time and resource intensive. Automated prediction methods such as Modern Information and Communication Technologies (ICTs), particularly those in Machine Learning (ML) area, are crucial for the early diagnosis and prognosis of stroke. Therefore, this… More >

  • Open Access

    ARTICLE

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

    Mustafa Sami Abdullatef*, Faten N. Alzubaidi, Anees Al-Tamimi, Yasser Ahmed Mahmood

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2083-2107, 2023, DOI:10.32604/fdmp.2023.027266 - 04 April 2023

    Abstract The ongoing effort to create methods for detecting and quantifying fatigue damage is motivated by the high levels of uncertainty in present fatigue-life prediction approaches and the frequently catastrophic nature of fatigue failure. The fatigue life of high strength aluminum alloy 2090-T83 is predicted in this study using a variety of artificial intelligence and machine learning techniques for constant amplitude and negative stress ratios (). Artificial neural networks (ANN), adaptive neuro-fuzzy inference systems (ANFIS), support-vector machines (SVM), a random forest model (RF), and an extreme-gradient tree-boosting model (XGB) are trained using numerical and experimental input… More > Graphic Abstract

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

  • Open Access

    ARTICLE

    Network Intrusion Detection Model Using Fused Machine Learning Technique

    Fahad Mazaed Alotaibi*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2479-2490, 2023, DOI:10.32604/cmc.2023.033792 - 31 March 2023

    Abstract With the progress of advanced technology in the industrial revolution encompassing the Internet of Things (IoT) and cloud computing, cyberattacks have been increasing rapidly on a large scale. The rapid expansion of IoT and networks in many forms generates massive volumes of data, which are vulnerable to security risks. As a result, cyberattacks have become a prevalent and danger to society, including its infrastructures, economy, and citizens’ privacy, and pose a national security risk worldwide. Therefore, cyber security has become an increasingly important issue across all levels and sectors. Continuous progress is being made in More >

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422 - 06 February 2023

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One… More >

  • Open Access

    REVIEW

    A Review of Machine Learning Techniques in Cyberbullying Detection

    Daniyar Sultan1,2,*, Batyrkhan Omarov3, Zhazira Kozhamkulova4, Gulnur Kazbekova5, Laura Alimzhanova1, Aigul Dautbayeva6, Yernar Zholdassov1, Rustam Abdrakhmanov3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5625-5640, 2023, DOI:10.32604/cmc.2023.033682 - 28 December 2022

    Abstract Automatic identification of cyberbullying is a problem that is gaining traction, especially in the Machine Learning areas. Not only is it complicated, but it has also become a pressing necessity, considering how social media has become an integral part of adolescents’ lives and how serious the impacts of cyberbullying and online harassment can be, particularly among teenagers. This paper contains a systematic literature review of modern strategies, machine learning methods, and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet. We undertake an in-depth review… More >

  • Open Access

    ARTICLE

    AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique

    Liaqat Ali1, Saif E. A. Alnawayseh2, Mohammed Salahat3, Taher M. Ghazal4,5,*, Mohsen A. A. Tomh6, Beenu Mago7

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1095-1104, 2023, DOI:10.32604/iasc.2023.031335 - 29 September 2022

    Abstract The immediate international spread of severe acute respiratory syndrome revealed the potential threat of infectious diseases in a closely integrated and interdependent world. When an outbreak occurs, each country must have a well-coordinated and preventative plan to address the situation. Information and Communication Technologies have provided innovative approaches to dealing with numerous facets of daily living. Although intelligent devices and applications have become a vital part of our everyday lives, smart gadgets have also led to several physical and psychological health problems in modern society. Here, we used an artificial intelligence AI-based system for disease More >

Displaying 11-20 on page 2 of 47. Per Page