Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461 - 26 March 2024

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the… More >

  • Open Access

    ARTICLE

    Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset

    Mohammed Abdalsalam1,*, Chunlin Li1, Abdelghani Dahou2, Natalia Kryvinska3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1427-1467, 2024, DOI:10.32604/cmes.2023.029911 - 17 November 2023

    Abstract One of the biggest dangers to society today is terrorism, where attacks have become one of the most significant risks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) have become the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management, medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related, initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terrorist attacks. The proposed framework posits that neglected text attributes included… More >

  • Open Access

    REVIEW

    Embracing the Future: AI and ML Transforming Urban Environments in Smart Cities

    Gagan Deep*, Jyoti Verma

    Journal on Artificial Intelligence, Vol.5, pp. 57-73, 2023, DOI:10.32604/jai.2023.043329 - 22 September 2023

    Abstract This research explores the increasing importance of Artificial Intelligence (AI) and Machine Learning (ML) with relation to smart cities. It discusses the AI and ML’s ability to revolutionize various aspects of urban environments, including infrastructure, governance, public safety, and sustainability. The research presents the definition and characteristics of smart cities, highlighting the key components and technologies driving initiatives for smart cities. The methodology employed in this study involved a comprehensive review of relevant literature, research papers, and reports on the subject of AI and ML in smart cities. Various sources were consulted to gather information… More >

  • Open Access

    ARTICLE

    Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment

    Saeed M. Alshahrani1, Jameel Almalki2, Waleed Alshehri2, Rashid Mehmood3, Marwan Albahar2, Najlaa Jannah2, Nayyar Ahmed Khan1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1793-1817, 2023, DOI:10.32604/csse.2023.039648 - 28 July 2023

    Abstract Artificial Intelligence (AI) has gained popularity for the containment of COVID-19 pandemic applications. Several AI techniques provide efficient mechanisms for handling pandemic situations. AI methods, protocols, data sets, and various validation mechanisms empower the users towards proper decision-making and procedures to handle the situation. Despite so many tools, there still exist conditions in which AI must go a long way. To increase the adaptability and potential of these techniques, a combination of AI and Bigdata is currently gaining popularity. This paper surveys and analyzes the methods within the various computational paradigms used by different researchers More >

  • Open Access

    ARTICLE

    Data Analytics on Unpredictable Pregnancy Data Records Using Ensemble Neuro-Fuzzy Techniques

    C. Vairavel1,*, N. S. Nithya2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2159-2175, 2023, DOI:10.32604/csse.2023.036598 - 09 February 2023

    Abstract The immune system goes through a profound transformation during pregnancy, and certain unexpected maternal complications have been correlated to this transition. The ability to correctly examine, diagnoses, and predict pregnancy-hastened diseases via the available big data is a delicate problem since the range of information continuously increases and is scalable. Many approaches for disease diagnosis/classification have been established with the use of data mining concepts. However, such methods do not provide an appropriate classification/diagnosis model. Furthermore, single learning approaches are used to create the bulk of these systems. Classification issues may be made more accurate… More >

  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Muhammad Irfan1, Ch. Anwar Ul Hassan2, Faisal Althobiani3, Nasir Ayub4,*, Raja Jalees Ul Hussen Khan5, Emad Ismat Ghandourah6, Majid A. Almas7, Saleh Mohammed Ghonaim3, V. R. Shamji3, Saifur Rahman1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141 - 09 February 2023

    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has… More >

  • Open Access

    ARTICLE

    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    R. Sheeba1,*, R. Sharmila2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321 - 09 February 2023

    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices.… More >

  • Open Access

    ARTICLE

    Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics

    Manar Mohamed Hafez1,*, Essam Eldin F. Elfakharany1, Amr A. Abohany2, Mostafa Thabet3

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 943-958, 2023, DOI:10.32604/cmc.2023.034078 - 06 February 2023

    Abstract Big data is usually unstructured, and many applications require the analysis in real-time. Decision tree (DT) algorithm is widely used to analyze big data. Selecting the optimal depth of DT is time-consuming process as it requires many iterations. In this paper, we have designed a modified version of a (DT). The tree aims to achieve optimal depth by self-tuning running parameters and improving the accuracy. The efficiency of the modified (DT) was verified using two datasets (airport and fire datasets). The airport dataset has 500000 instances and the fire dataset has 600000 instances. A comparison More >

  • Open Access

    ARTICLE

    Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics

    M. Priyadharsini1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2187-2205, 2023, DOI:10.32604/csse.2023.031115 - 03 November 2022

    Abstract Big Data applications face different types of complexities in classifications. Cleaning and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed data. The existing scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. Recently ensemble methods have made a mark in classification tasks as combine multiple results into a single representation. When comparing to a single model, this technique offers for improved prediction. Ensemble based feature selections parallel… More >

  • Open Access

    ARTICLE

    Big Data Analytics Using Graph Signal Processing

    Farhan Amin1, Omar M. Barukab2, Gyu Sang Choi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 489-502, 2023, DOI:10.32604/cmc.2023.030615 - 22 September 2022

    Abstract The networks are fundamental to our modern world and they appear throughout science and society. Access to a massive amount of data presents a unique opportunity to the researcher’s community. As networks grow in size the complexity increases and our ability to analyze them using the current state of the art is at severe risk of failing to keep pace. Therefore, this paper initiates a discussion on graph signal processing for large-scale data analysis. We first provide a comprehensive overview of core ideas in Graph signal processing (GSP) and their connection to conventional digital signal… More >

Displaying 1-10 on page 1 of 43. Per Page