Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (710)
  • Open Access

    ARTICLE

    Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model

    U. Sakthivelu, C. N. S. Vinoth Kumar*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3691-3707, 2023, DOI:10.32604/iasc.2023.036946

    Abstract The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s livelihood. Several cyber-attacks lead to the compromise of data security. The proposed system offers complete data protection from Advanced Persistent Threat (APT) attacks with attack detection and defence mechanisms. The modified lateral movement detection algorithm detects the APT attacks, while the defence is achieved by the Dynamic Deception system that makes use of the belief update algorithm. Before termination, every cyber-attack undergoes multiple stages, with the most prominent stage being Lateral Movement (LM). The LM uses a Remote Desktop protocol (RDP)… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intrusion Detection System in the IoT Environment Using Feature Selection Technique

    Moody Alhanaya, Khalil Hamdi Ateyeh Al-Shqeerat*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3709-3724, 2023, DOI:10.32604/iasc.2023.036856

    Abstract The increasing number of security holes in the Internet of Things (IoT) networks creates a question about the reliability of existing network intrusion detection systems. This problem has led to the developing of a research area focused on improving network-based intrusion detection system (NIDS) technologies. According to the analysis of different businesses, most researchers focus on improving the classification results of NIDS datasets by combining machine learning and feature reduction techniques. However, these techniques are not suitable for every type of network. In light of this, whether the optimal algorithm and feature reduction techniques can be generalized across various datasets… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Analysis of Social Media Impact on Stock Price Movements Using Machine Learning Anomaly Detection

    Richard Cruz1, Johnson Kinyua1,*, Charles Mutigwe2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3405-3423, 2023, DOI:10.32604/iasc.2023.035906

    Abstract The massive increase in the volume of data generated by individuals on social media microblog platforms such as Twitter and Reddit every day offers researchers unique opportunities to analyze financial markets from new perspectives. The meme stock mania of 2021 brought together stock traders and investors that were also active on social media. This mania was in good part driven by retail investors’ discussions on investment strategies that occurred on social media platforms such as Reddit during the COVID-19 lockdowns. The stock trades by these retail investors were then executed using services like Robinhood. In this paper, machine learning models… More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud computing services and a data… More >

  • Open Access

    ARTICLE

    An Endogenous Feedback and Entropy Analysis in Machine Learning Model for Stock’s Return Forecast

    Edson Vinicius Pontes Bastos1,*, Jorge Junio Moreira Antunes2, Lino Guimarães Marujo1, Peter Fernandes Wanke2, Roberto Ivo da Rocha Lima Filho1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3175-3190, 2023, DOI:10.32604/iasc.2023.034582

    Abstract Stock markets exhibit Brownian movement with random, non-linear, uncertain, evolutionary, non-parametric, nebulous, chaotic characteristics and dynamism with a high degree of complexity. Developing an algorithm to predict returns for decision-making is a challenging goal. In addition, the choice of variables that will serve as input to the model represents a non-triviality, since it is possible to observe endogeneity problems between the predictor and the predicted variables. Thus, the goal is to analyze the endogenous origin of the stock return prediction model based on technical indicators. For this, we structure a feed-forward neural network. We evaluate the endogenous feedback between the… More >

  • Open Access

    ARTICLE

    Novel Vegetation Mapping Through Remote Sensing Images Using Deep Meta Fusion Model

    S. Vijayalakshmi*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2915-2931, 2023, DOI:10.32604/iasc.2023.034165

    Abstract Preserving biodiversity and maintaining ecological balance is essential in current environmental conditions. It is challenging to determine vegetation using traditional map classification approaches. The primary issue in detecting vegetation pattern is that it appears with complex spatial structures and similar spectral properties. It is more demandable to determine the multiple spectral analyses for improving the accuracy of vegetation mapping through remotely sensed images. The proposed framework is developed with the idea of ensembling three effective strategies to produce a robust architecture for vegetation mapping. The architecture comprises three approaches, feature-based approach, region-based approach, and texture-based approach for classifying the vegetation… More >

  • Open Access

    ARTICLE

    Political Optimizer with Probabilistic Neural Network-Based Arabic Comparative Opinion Mining

    Najm Alotaibi1, Badriyya B. Al-onazi2, Mohamed K. Nour3, Abdullah Mohamed4, Abdelwahed Motwakel5,*, Gouse Pasha Mohammed5, Ishfaq Yaseen5, Mohammed Rizwanullah5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3121-3137, 2023, DOI:10.32604/iasc.2023.033915

    Abstract Opinion Mining (OM) studies in Arabic are limited though it is one of the most extensively-spoken languages worldwide. Though the interest in OM studies in the Arabic language is growing among researchers, it needs a vast number of investigations due to the unique morphological principles of the language. Arabic OM studies experience multiple challenges owing to the poor existence of language sources and Arabic-specific linguistic features. The comparative OM studies in the English language are wide and novel. But, comparative OM studies in the Arabic language are yet to be established and are still in a nascent stage. The unique… More >

  • Open Access

    ARTICLE

    A Novel Deep Learning Representation for Industrial Control System Data

    Bowen Zhang1,2,3, Yanbo Shi4, Jianming Zhao1,2,3,*, Tianyu Wang1,2,3, Kaidi Wang5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2703-2717, 2023, DOI:10.32604/iasc.2023.033762

    Abstract Feature extraction plays an important role in constructing artificial intelligence (AI) models of industrial control systems (ICSs). Three challenges in this field are learning effective representation from high-dimensional features, data heterogeneity, and data noise due to the diversity of data dimensions, formats and noise of sensors, controllers and actuators. Hence, a novel unsupervised learning autoencoder model is proposed for ICS data in this paper. Although traditional methods only capture the linear correlations of ICS features, our deep industrial representation learning model (DIRL) based on a convolutional neural network can mine high-order features, thus solving the problem of high-dimensional and heterogeneous… More >

  • Open Access

    ARTICLE

    Sequence-Based Predicting Bacterial Essential ncRNAs Algorithm by Machine Learning

    Yuan-Nong Ye1,2,3,*, Ding-Fa Liang2, Abraham Alemayehu Labena4, Zhu Zeng2,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2731-2741, 2023, DOI:10.32604/iasc.2023.026761

    Abstract Essential ncRNA is a type of ncRNA which is indispensable for the survival of organisms. Although essential ncRNAs cannot encode proteins, they are as important as essential coding genes in biology. They have got wide variety of applications such as antimicrobial target discovery, minimal genome construction and evolution analysis. At present, the number of species required for the determination of essential ncRNAs in the whole genome scale is still very few due to the traditional methods are time-consuming, laborious and costly. In addition, traditional experimental methods are limited by the organisms as less than 1% of bacteria can be cultured… More >

Displaying 1-10 on page 1 of 710. Per Page  

Share Link

WeChat scan