Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    AMDnet: An Academic Misconduct Detection Method for Authors’ Behaviors

    Shihao Zhou1, Ziyuan Xu3,4, Jin Han1,*, Xingming Sun1,2, Yi Cao5

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5995-6009, 2022, DOI:10.32604/cmc.2022.023316

    Abstract In recent years, academic misconduct has been frequently exposed by the media, with serious impacts on the academic community. Current research on academic misconduct focuses mainly on detecting plagiarism in article content through the application of character-based and non-text element detection techniques over the entirety of a manuscript. For the most part, these techniques can only detect cases of textual plagiarism, which means that potential culprits can easily avoid discovery through clever editing and alterations of text content. In this paper, we propose an academic misconduct detection method based on scholars’ submission behaviors. The model can effectively capture the atypical… More >

  • Open Access

    ARTICLE

    A New Fuzzy Adaptive Algorithm to Classify Imbalanced Data

    Harshita Patel1, Dharmendra Singh Rajput1,*, Ovidiu Petru Stan2, Liviu Cristian Miclea2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 73-89, 2022, DOI:10.32604/cmc.2022.017114

    Abstract Classification of imbalanced data is a well explored issue in the data mining and machine learning community where one class representation is overwhelmed by other classes. The Imbalanced distribution of data is a natural occurrence in real world datasets, so needed to be dealt with carefully to get important insights. In case of imbalance in data sets, traditional classifiers have to sacrifice their performances, therefore lead to misclassifications. This paper suggests a weighted nearest neighbor approach in a fuzzy manner to deal with this issue. We have adapted the ‘existing algorithm modification solution’ to learn from imbalanced datasets that classify… More >

  • Open Access

    ARTICLE

    A New Random Forest Applied to Heavy Metal Risk Assessment

    Ziyan Yu1, Cong Zhang1,*, Naixue Xiong2, Fang Chen1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 207-221, 2022, DOI:10.32604/csse.2022.018301

    Abstract As soil heavy metal pollution is increasing year by year, the risk assessment of soil heavy metal pollution is gradually gaining attention. Soil heavy metal datasets are usually imbalanced datasets in which most of the samples are safe samples that are not contaminated with heavy metals. Random Forest (RF) has strong generalization ability and is not easy to overfit. In this paper, we improve the Bagging algorithm and simple voting method of RF. A W-RF algorithm based on adaptive Bagging and weighted voting is proposed to improve the classification performance of RF on imbalanced datasets. Adaptive Bagging enables trees in… More >

  • Open Access

    ARTICLE

    An Approach Using Fuzzy Sets and Boosting Techniques to Predict Liver Disease

    Pushpendra Kumar1,2,*, Ramjeevan Singh Thakur3

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3513-3529, 2021, DOI:10.32604/cmc.2021.016957

    Abstract The aim of this research is to develop a mechanism to help medical practitioners predict and diagnose liver disease. Several systems have been proposed to help medical experts by diminishing error and increasing accuracy in diagnosing and predicting diseases. Among many existing methods, a few have considered the class imbalance issues of liver disorder datasets. As all the samples of liver disorder datasets are not useful, they do not contribute to learning about classifiers. A few samples might be redundant, which can increase the computational cost and affect the performance of the classifier. In this paper, a model has been… More >

  • Open Access

    ARTICLE

    Dealing with Imbalanced Dataset Leveraging Boundary Samples Discovered by Support Vector Data Description

    Zhengbo Luo1, Hamïd Parvïn2,3,4,*, Harish Garg5, Sultan Noman Qasem6,7, Kim-Hung Pho8, Zulkefli Mansor9

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2691-2708, 2021, DOI:10.32604/cmc.2021.012547

    Abstract These days, imbalanced datasets, denoted throughout the paper by ID, (a dataset that contains some (usually two) classes where one contains considerably smaller number of samples than the other(s)) emerge in many real world problems (like health care systems or disease diagnosis systems, anomaly detection, fraud detection, stream based malware detection systems, and so on) and these datasets cause some problems (like under-training of minority class(es) and over-training of majority class(es), bias towards majority class(es), and so on) in classification process and application. Therefore, these datasets take the focus of many researchers in any science and there are several solutions… More >

  • Open Access

    ARTICLE

    A Rasterized Lightning Disaster Risk Method for Imbalanced Sets Using Neural Network

    Yan Zhang1,2, Jin Han1,2,*, Chengsheng Yuan1,2, Shuo Yang3, Chuanlong Li1,2, Xingming Sun1,2

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 563-574, 2021, DOI:10.32604/cmc.2020.012502

    Abstract Over the past 10 years, lightning disaster has caused a large number of casualties and considerable economic loss worldwide. Lightning poses a huge threat to various industries. In an attempt to reduce the risk of lightning-caused disaster, many scholars have carried out in-depth research on lightning. However, these studies focus primarily on the lightning itself and other meteorological elements are ignored. In addition, the methods for assessing the risk of lightning disaster fail to give detailed attention to regional features (lightning disaster risk). This paper proposes a grid-based risk assessment method based on data from multiple sources. First, this paper… More >

  • Open Access

    ARTICLE

    Ensemble Strategy for Insider Threat Detection from User Activity Logs

    Shihong Zou1, Huizhong Sun1, *, Guosheng Xu1, Ruijie Quan2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1321-1334, 2020, DOI:10.32604/cmc.2020.09649

    Abstract In the information era, the core business and confidential information of enterprises/organizations is stored in information systems. However, certain malicious inside network users exist hidden inside the organization; these users intentionally or unintentionally misuse the privileges of the organization to obtain sensitive information from the company. The existing approaches on insider threat detection mostly focus on monitoring, detecting, and preventing any malicious behavior generated by users within an organization’s system while ignoring the imbalanced ground-truth insider threat data impact on security. To this end, to be able to detect insider threats more effectively, a data processing tool was developed to… More >

  • Open Access

    ARTICLE

    A Novel Strategy for Mining Highly Imbalanced Data in Credit Card Transactions

    Masoumeh Zareapoor, Jie Yang

    Intelligent Automation & Soft Computing, Vol.24, No.4, pp. 721-727, 2018, DOI:10.1080/10798587.2017.1321228

    Abstract The design of an efficient credit card fraud detection technique is, however, particularly challenging, due to the most striking characteristics which are; imbalancedness and non-stationary environment of the data. These issues in credit card datasets limit the machine learning algorithm to show a good performance in detecting the frauds. The research in the area of credit card fraud detection focused on detection the fraudulent transaction by analysis of normality and abnormality concepts. Balancing strategy which is designed in this paper can facilitate classification and retrieval problems in this domain. In this paper, we consider the classification problem in supervised learning… More >

  • Open Access

    ARTICLE

    Credit Card Fraud Detection Based on Machine Learning

    Yong Fang1, Yunyun Zhang2, Cheng Huang1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 185-195, 2019, DOI:10.32604/cmc.2019.06144

    Abstract In recent years, the rapid development of e-commerce exposes great vulnerabilities in online transactions for fraudsters to exploit. Credit card transactions take a salient role in nowadays’ online transactions for its obvious advantages including discounts and earning credit card points. So credit card fraudulence has become a target of concern. In order to deal with the situation, credit card fraud detection based on machine learning is been studied recently. Yet, it is difficult to detect fraudulent transactions due to data imbalance (normal and fraudulent transactions), for which Smote algorithm is proposed in order to resolve data imbalance. The assessment of… More >

  • Open Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708

    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones, which generate synthetic examples… More >

Displaying 11-20 on page 2 of 20. Per Page