Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach to Classify the Plant Leaf Species

    Javed Rashid1,2, Imran Khan1, Irshad Ahmed Abbasi3, Muhammad Rizwan Saeed4, Mubbashar Saddique5,*, Mohamed Abbas6,7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3897-3920, 2023, DOI:10.32604/cmc.2023.040356

    Abstract Many plant species have a startling degree of morphological similarity, making it difficult to split and categorize them reliably. Unknown plant species can be challenging to classify and segment using deep learning. While using deep learning architectures has helped improve classification accuracy, the resulting models often need to be more flexible and require a large dataset to train. For the sake of taxonomy, this research proposes a hybrid method for categorizing guava, potato, and java plum leaves. Two new approaches are used to form the hybrid model suggested here. The guava, potato, and java plum plant species have been successfully… More >

  • Open Access

    ARTICLE

    Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic

    Ammar Almomani1,2,*, Iman Akour3, Ahmed M. Manasrah4,5, Omar Almomani6, Mohammad Alauthman7, Esra’a Abdullah1, Amaal Al Shwait1, Razan Al Sharaa1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2499-2517, 2023, DOI:10.32604/iasc.2023.039687

    Abstract The exponential growth of Internet and network usage has necessitated heightened security measures to protect against data and network breaches. Intrusions, executed through network packets, pose a significant challenge for firewalls to detect and prevent due to the similarity between legitimate and intrusion traffic. The vast network traffic volume also complicates most network monitoring systems and algorithms. Several intrusion detection methods have been proposed, with machine learning techniques regarded as promising for dealing with these incidents. This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base (Random Forest, Decision Tree, and k-Nearest-Neighbors). The proposed system employs pre-processing… More >

  • Open Access

    ARTICLE

    Intrusion Detection Method Based on Active Incremental Learning in Industrial Internet of Things Environment

    Zeyong Sun1, Guo Ran2, Zilong Jin1,3,*

    Journal on Internet of Things, Vol.4, No.2, pp. 99-111, 2022, DOI:10.32604/jiot.2022.037416

    Abstract Intrusion detection is a hot field in the direction of network security. Classical intrusion detection systems are usually based on supervised machine learning models. These offline-trained models usually have better performance in the initial stages of system construction. However, due to the diversity and rapid development of intrusion techniques, the trained models are often difficult to detect new attacks. In addition, very little noisy data in the training process often has a considerable impact on the performance of the intrusion detection system. This paper proposes an intrusion detection system based on active incremental learning with the adaptive capability to solve… More >

  • Open Access

    ARTICLE

    Boosted Stacking Ensemble Machine Learning Method for Wafer Map Pattern Classification

    Jeonghoon Choi1, Dongjun Suh1,*, Marc-Oliver Otto2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2945-2966, 2023, DOI:10.32604/cmc.2023.033417

    Abstract Recently, machine learning-based technologies have been developed to automate the classification of wafer map defect patterns during semiconductor manufacturing. The existing approaches used in the wafer map pattern classification include directly learning the image through a convolution neural network and applying the ensemble method after extracting image features. This study aims to classify wafer map defects more effectively and derive robust algorithms even for datasets with insufficient defect patterns. First, the number of defects during the actual process may be limited. Therefore, insufficient data are generated using convolutional auto-encoder (CAE), and the expanded data are verified using the evaluation technique… More >

  • Open Access

    ARTICLE

    GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak

    Walaa N. Ismail1,2,*, Hessah A. Alsalamah3,4, Ebtesam Mohamed2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3945-3976, 2023, DOI:10.32604/cmc.2023.031194

    Abstract As a result of the increased number of COVID-19 cases, Ensemble Machine Learning (EML) would be an effective tool for combatting this pandemic outbreak. An ensemble of classifiers can improve the performance of single machine learning (ML) classifiers, especially stacking-based ensemble learning. Stacking utilizes heterogeneous-base learners trained in parallel and combines their predictions using a meta-model to determine the final prediction results. However, building an ensemble often causes the model performance to decrease due to the increasing number of learners that are not being properly selected. Therefore, the goal of this paper is to develop and evaluate a generic, data-independent… More >

  • Open Access

    ARTICLE

    Stacking Ensemble Learning-Based Convolutional Gated Recurrent Neural Network for Diabetes Miletus

    G. Geetha1,2,*, K. Mohana Prasad1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 703-718, 2023, DOI:10.32604/iasc.2023.032530

    Abstract Diabetes mellitus is a metabolic disease in which blood glucose levels rise as a result of pancreatic insulin production failure. It causes hyperglycemia and chronic multiorgan dysfunction, including blindness, renal failure, and cardiovascular disease, if left untreated. One of the essential checks that are needed to be performed frequently in Type 1 Diabetes Mellitus is a blood test, this procedure involves extracting blood quite frequently, which leads to subject discomfort increasing the possibility of infection when the procedure is often recurring. Existing methods used for diabetes classification have less classification accuracy and suffer from vanishing gradient problems, to overcome these… More >

  • Open Access

    ARTICLE

    Airstacknet: A Stacking Ensemble-Based Approach for Air Quality Prediction

    Amel Ksibi1, Amina Salhi1, Ala Saleh Alluhaidan1,*, Sahar A. El-Rahman2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2073-2096, 2023, DOI:10.32604/cmc.2023.032566

    Abstract The quality of the air we breathe during the courses of our daily lives has a significant impact on our health and well-being as individuals. Unfortunately, personal air quality measurement remains challenging. In this study, we investigate the use of first-person photos for the prediction of air quality. The main idea is to harness the power of a generalized stacking approach and the importance of haze features extracted from first-person images to create an efficient new stacking model called AirStackNet for air pollution prediction. AirStackNet consists of two layers and four regression models, where the first layer generates meta-data from… More >

  • Open Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414

    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic Algorithm (GA) was used for… More >

  • Open Access

    ARTICLE

    A Multi-Agent Stacking Ensemble Hybridized with Vaguely Quantified Rough Set for Medical Diagnosis

    Ali M. Aseere1,*, Ayodele Lasisi2

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 683-699, 2021, DOI:10.32604/iasc.2021.014811

    Abstract In the absence of fast and adequate measures to combat them, life-threatening diseases are catastrophic to human health. Computational intelligent algorithms characterized by their adaptability, robustness, diversity, and recognition abilities allow for the diagnosis of medical diseases. This enhances the decision-making process of physicians. The objective is to predict and classify diseases accurately. In this paper, we proposed a multi-agent stacked ensemble classifier based on a vaguely quantified rough set, simple logistic algorithm, sequential minimal optimization (SMO), and JRip. The vaguely quantified rough set (VQRS) is used for feature selection and eradicating noise in the data. There are two classifier… More >

  • Open Access

    ARTICLE

    A Stacking-Based Deep Neural Network Approach for Effective Network Anomaly Detection

    Lewis Nkenyereye1, Bayu Adhi Tama2, Sunghoon Lim3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 2217-2227, 2021, DOI:10.32604/cmc.2020.012432

    Abstract An anomaly-based intrusion detection system (A-IDS) provides a critical aspect in a modern computing infrastructure since new types of attacks can be discovered. It prevalently utilizes several machine learning algorithms (ML) for detecting and classifying network traffic. To date, lots of algorithms have been proposed to improve the detection performance of A-IDS, either using individual or ensemble learners. In particular, ensemble learners have shown remarkable performance over individual learners in many applications, including in cybersecurity domain. However, most existing works still suffer from unsatisfactory results due to improper ensemble design. The aim of this study is to emphasize the effectiveness… More >

Displaying 1-10 on page 1 of 10. Per Page