Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    ERBM: A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments

    Arshad Mehmmod1,#, Komal Batool1,#, Ahthsham Sajid2,3, Muhammad Mansoor Alam2,3, Mazliham MohD Su’ud3,*, Inam Ullah Khan3

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5155-5179, 2025, DOI:10.32604/cmc.2025.062971 - 19 May 2025

    Abstract Traditional rule-based Intrusion Detection Systems (IDS) are commonly employed owing to their simple design and ability to detect known threats. Nevertheless, as dynamic network traffic and a new degree of threats exist in IoT environments, these systems do not perform well and have elevated false positive rates—consequently decreasing detection accuracy. In this study, we try to overcome these restrictions by employing fuzzy logic and machine learning to develop an Enhanced Rule-Based Model (ERBM) to classify the packets better and identify intrusions. The ERBM developed for this approach improves data preprocessing and feature selections by utilizing… More >

  • Open Access

    ARTICLE

    A Hybrid Framework Combining Rule-Based and Deep Learning Approaches for Data-Driven Verdict Recommendations

    Muhammad Hameed Siddiqi1,*, Menwa Alshammeri1, Jawad Khan2,*, Muhammad Faheem Khan3, Asfandyar Khan4, Madallah Alruwaili1, Yousef Alhwaiti1, Saad Alanazi1, Irshad Ahmad5

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5345-5371, 2025, DOI:10.32604/cmc.2025.062340 - 19 May 2025

    Abstract As legal cases grow in complexity and volume worldwide, integrating machine learning and artificial intelligence into judicial systems has become a pivotal research focus. This study introduces a comprehensive framework for verdict recommendation that synergizes rule-based methods with deep learning techniques specifically tailored to the legal domain. The proposed framework comprises three core modules: legal feature extraction, semantic similarity assessment, and verdict recommendation. For legal feature extraction, a rule-based approach leverages Black’s Law Dictionary and WordNet Synsets to construct feature vectors from judicial texts. Semantic similarity between cases is evaluated using a hybrid method that… More >

  • Open Access

    ARTICLE

    A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM

    Federica Uccello1,2, Marek Pawlicki3,4, Salvatore D'Antonio1, Rafał Kozik3,4, Michał Choraś3,4,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1607-1621, 2025, DOI:10.32604/cmc.2025.062801 - 16 April 2025

    Abstract The growing sophistication of cyberthreats, among others the Distributed Denial of Service attacks, has exposed limitations in traditional rule-based Security Information and Event Management systems. While machine learning–based intrusion detection systems can capture complex network behaviours, their “black-box” nature often limits trust and actionable insight for security operators. This study introduces a novel approach that integrates Explainable Artificial Intelligence—xAI—with the Random Forest classifier to derive human-interpretable rules, thereby enhancing the detection of Distributed Denial of Service (DDoS) attacks. The proposed framework combines traditional static rule formulation with advanced xAI techniques—SHapley Additive exPlanations and Scoped Rules More >

  • Open Access

    ARTICLE

    Fuzzy Rule-Based Model to Train Videos in Video Surveillance System

    A. Manju1, A. Revathi2, M. Arivukarasi1, S. Hariharan3, V. Umarani4, Shih-Yu Chen5,*, Jin Wang6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 905-920, 2023, DOI:10.32604/iasc.2023.038444 - 29 April 2023

    Abstract With the proliferation of the internet, big data continues to grow exponentially, and video has become the largest source. Video big data introduces many technological challenges, including compression, storage, transmission, analysis, and recognition. The increase in the number of multimedia resources has brought an urgent need to develop intelligent methods to organize and process them. The integration between Semantic link Networks and multimedia resources provides a new prospect for organizing them with their semantics. The tags and surrounding texts of multimedia resources are used to measure their semantic association. Two evaluation methods including clustering and… More >

  • Open Access

    ARTICLE

    A Novel Belief Rule-Based Fault Diagnosis Method with Interpretability

    Zhijie Zhou1, Zhichao Ming1,*, Jie Wang1, Shuaiwen Tang1, You Cao1, Xiaoxia Han1, Gang Xiang2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1165-1185, 2023, DOI:10.32604/cmes.2023.025399 - 06 February 2023

    Abstract Fault diagnosis plays an irreplaceable role in the normal operation of equipment. A fault diagnosis model is often required to be interpretable for increasing the trust between humans and the model. Due to the understandable knowledge expression and transparent reasoning process, the belief rule base (BRB) has extensive applications as an interpretable expert system in fault diagnosis. Optimization is an effective means to weaken the subjectivity of experts in BRB, where the interpretability of BRB may be weakened. Hence, to obtain a credible result, the weakening factors of interpretability in the BRB-based fault diagnosis model… More > Graphic Abstract

    A Novel Belief Rule-Based Fault Diagnosis Method with Interpretability

  • Open Access

    ARTICLE

    A Rule-Based Approach for Grey Hole Attack Prediction in Wireless Sensor Networks

    C. Gowdham*, S. Nithyanandam

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3815-3827, 2023, DOI:10.32604/iasc.2023.031876 - 17 August 2022

    Abstract The Wireless Sensor Networks (WSN) are vulnerable to assaults due to the fact that the devices connected to them have a reliable connection to the internet. A malicious node acts as the controller and uses a grey hole attack to get the data from all of the other nodes in the network. Additionally, the nodes are discarding and modifying the data packets according to the requirements of the system. The assault modifies the fundamental concept of the WSNs, which is that different devices should communicate with one another. In the proposed system, there is a… More >

  • Open Access

    ARTICLE

    Multi Layered Rule-Based Technique for Explicit Aspect Extraction from Online Reviews

    Mubashar Hussain1, Toqir A. Rana2,3, Aksam Iftikhar4, M. Usman Ashraf5,*, Muhammad Waseem Iqbal6, Ahmed Alshaflut7, Abdullah Alourani8

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4641-4656, 2022, DOI:10.32604/cmc.2022.024759 - 28 July 2022

    Abstract In the field of sentiment analysis, extracting aspects or opinion targets from user reviews about a product is a key task. Extracting the polarity of an opinion is much more useful if we also know the targeted Aspect or Feature. Rule based approaches, like dependency-based rules, are quite popular and effective for this purpose. However, they are heavily dependent on the authenticity of the employed parts-of-speech (POS) tagger and dependency parser. Another popular rule based approach is to use sequential rules, wherein the rules formulated by learning from the user’s behavior. However, in general, the… More >

  • Open Access

    ARTICLE

    Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction

    Huiyu Sun*, Ralph Grishman

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1415-1423, 2022, DOI:10.32604/iasc.2022.030794 - 25 May 2022

    Abstract Active learning methods which present selected examples from the corpus for annotation provide more efficient learning of supervised relation extraction models, but they leave the developer in the unenviable role of a passive informant. To restore the developer’s proper role as a partner with the system, we must give the developer an ability to inspect the extraction model during development. We propose to make this possible through a representation based on lexicalized dependency paths (LDPs) coupled with an active learner for LDPs. We apply LDPs to both simulated and real active learning with ACE as evaluation More >

  • Open Access

    ARTICLE

    Lexicalized Dependency Paths Based Supervised Learning for Relation Extraction

    Huiyu Sun*, Ralph Grishman

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 861-870, 2022, DOI:10.32604/csse.2022.030759 - 09 May 2022

    Abstract Log-linear models and more recently neural network models used for supervised relation extraction requires substantial amounts of training data and time, limiting the portability to new relations and domains. To this end, we propose a training representation based on the dependency paths between entities in a dependency tree which we call lexicalized dependency paths (LDPs). We show that this representation is fast, efficient and transparent. We further propose representations utilizing entity types and its subtypes to refine our model and alleviate the data sparsity problem. We apply lexicalized dependency paths to supervised learning using the More >

  • Open Access

    ARTICLE

    A New Color Model for Fire Pixels Detection in PJF Color Space

    Amal Ben Hamida1,*, Chokri Ben Amar2, Yasser Albagory2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1607-1621, 2022, DOI:10.32604/iasc.2022.024939 - 24 March 2022

    Abstract Since the number of fires in the world is rising rapidly, automatic fire detection is getting more and more interest in computer vision community. Instead of the usual inefficient sensors, captured videos by video surveillance cameras can be analyzed to quickly detect fires and prevent damages. This paper presents an early fire-alarm raising method based on image processing. The developed work is able to discriminate fire and non-fire pixels. Fire pixels are identified thanks to a rule-based color model built in the PJF color space. PJF is a newly designed color space that enables to… More >

Displaying 1-10 on page 1 of 16. Per Page