Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    A Study on Outlier Detection and Feature Engineering Strategies in Machine Learning for Heart Disease Prediction

    Varada Rajkumar Kukkala1, Surapaneni Phani Praveen2, Naga Satya Koti Mani Kumar Tirumanadham3, Parvathaneni Naga Srinivasu4,5,*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1085-1112, 2024, DOI:10.32604/csse.2024.053603 - 13 September 2024

    Abstract This paper investigates the application of machine learning to develop a response model to cardiovascular problems and the use of AdaBoost which incorporates an application of Outlier Detection methodologies namely; Z-Score incorporated with Grey Wolf Optimization (GWO) as well as Interquartile Range (IQR) coupled with Ant Colony Optimization (ACO). Using a performance index, it is shown that when compared with the Z-Score and GWO with AdaBoost, the IQR and ACO, with AdaBoost are not very accurate (89.0% vs. 86.0%) and less discriminative (Area Under the Curve (AUC) score of 93.0% vs. 91.0%). The Z-Score and GWO… More >

  • Open Access

    ARTICLE

    A Low Complexity ML-Based Methods for Malware Classification

    Mahmoud E. Farfoura1,*, Ahmad Alkhatib1, Deema Mohammed Alsekait2,*, Mohammad Alshinwan3,7, Sahar A. El-Rahman4, Didi Rosiyadi5, Diaa Salama AbdElminaam6,7

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4833-4857, 2024, DOI:10.32604/cmc.2024.054849 - 12 September 2024

    Abstract The article describes a new method for malware classification, based on a Machine Learning (ML) model architecture specifically designed for malware detection, enabling real-time and accurate malware identification. Using an innovative feature dimensionality reduction technique called the Interpolation-based Feature Dimensionality Reduction Technique (IFDRT), the authors have significantly reduced the feature space while retaining critical information necessary for malware classification. This technique optimizes the model’s performance and reduces computational requirements. The proposed method is demonstrated by applying it to the BODMAS malware dataset, which contains 57,293 malware samples and 77,142 benign samples, each with a 2381-feature… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Machine Learning Algorithms in Reduced Dimensional Spaces

    Kaveh Heidary1,*, Venkata Atluri1, John Bland2

    Journal of Cyber Security, Vol.6, pp. 69-87, 2024, DOI:10.32604/jcs.2024.051196 - 28 August 2024

    Abstract This paper investigates the impact of reducing feature-vector dimensionality on the performance of machine learning (ML) models. Dimensionality reduction and feature selection techniques can improve computational efficiency, accuracy, robustness, transparency, and interpretability of ML models. In high-dimensional data, where features outnumber training instances, redundant or irrelevant features introduce noise, hindering model generalization and accuracy. This study explores the effects of dimensionality reduction methods on binary classifier performance using network traffic data for cybersecurity applications. The paper examines how dimensionality reduction techniques influence classifier operation and performance across diverse performance metrics for seven ML models. Four… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Layer Perceptron for Fetal Health Classification Using Cardiotocography Data

    Uddagiri Sirisha1,, Parvathaneni Naga Srinivasu2,3,*, Panguluri Padmavathi4, Seongki Kim5,, Aruna Pavate6, Jana Shafi7, Muhammad Fazal Ijaz8,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2301-2330, 2024, DOI:10.32604/cmc.2024.053132 - 15 August 2024

    Abstract Fetal health care is vital in ensuring the health of pregnant women and the fetus. Regular check-ups need to be taken by the mother to determine the status of the fetus’ growth and identify any potential problems. To know the status of the fetus, doctors monitor blood reports, Ultrasounds, cardiotocography (CTG) data, etc. Still, in this research, we have considered CTG data, which provides information on heart rate and uterine contractions during pregnancy. Several researchers have proposed various methods for classifying the status of fetus growth. Manual processing of CTG data is time-consuming and unreliable.… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530 - 25 April 2024

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This… More >

  • Open Access

    ARTICLE

    An Early Warning Model of Telecommunication Network Fraud Based on User Portrait

    Wen Deng1, Guangjun Liang1,2,3,*, Chenfei Yu1, Kefan Yao1, Chengrui Wang1, Xuan Zhang1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1561-1576, 2023, DOI:10.32604/cmc.2023.035016 - 06 February 2023

    Abstract With the frequent occurrence of telecommunications and network fraud crimes in recent years, new frauds have emerged one after another which has caused huge losses to the people. However, due to the lack of an effective preventive mechanism, the police are often in a passive position. Using technologies such as web crawlers, feature engineering, deep learning, and artificial intelligence, this paper proposes a user portrait fraud warning scheme based on Weibo public data. First, we perform preliminary screening and cleaning based on the keyword “defrauded” to obtain valid fraudulent user Identity Documents (IDs). The basic… More >

  • Open Access

    ARTICLE

    A Multi-Module Machine Learning Approach to Detect Tax Fraud

    N. Alsadhan*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 241-253, 2023, DOI:10.32604/csse.2023.033375 - 20 January 2023

    Abstract Tax fraud is one of the substantial issues affecting governments around the world. It is defined as the intentional alteration of information provided on a tax return to reduce someone’s tax liability. This is done by either reducing sales or increasing purchases. According to recent studies, governments lose over $500 billion annually due to tax fraud. A loss of this magnitude motivates tax authorities worldwide to implement efficient fraud detection strategies. Most of the work done in tax fraud using machine learning is centered on supervised models. A significant drawback of this approach is that… More >

  • Open Access

    ARTICLE

    Energy Theft Detection in Smart Grids with Genetic Algorithm-Based Feature Selection

    Muhammad Umair1,*, Zafar Saeed1, Faisal Saeed2, Hiba Ishtiaq1, Muhammad Zubair1, Hala Abdel Hameed3,4

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5431-5446, 2023, DOI:10.32604/cmc.2023.033884 - 28 December 2022

    Abstract As big data, its technologies, and application continue to advance, the Smart Grid (SG) has become one of the most successful pervasive and fixed computing platforms that efficiently uses a data-driven approach and employs efficient information and communication technology (ICT) and cloud computing. As a result of the complicated architecture of cloud computing, the distinctive working of advanced metering infrastructures (AMI), and the use of sensitive data, it has become challenging to make the SG secure. Faults of the SG are categorized into two main categories, Technical Losses (TLs) and Non-Technical Losses (NTLs). Hardware failure,… More >

  • Open Access

    ARTICLE

    Diabetes Prediction Using Derived Features and Ensembling of Boosting Classifiers

    R. Rajkamal1,*, Anitha Karthi2, Xiao-Zhi Gao3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2013-2033, 2022, DOI:10.32604/cmc.2022.027142 - 18 May 2022

    Abstract Diabetes is increasing commonly in people’s daily life and represents an extraordinary threat to human well-being. Machine Learning (ML) in the healthcare industry has recently made headlines. Several ML models are developed around different datasets for diabetic prediction. It is essential for ML models to predict diabetes accurately. Highly informative features of the dataset are vital to determine the capability factors of the model in the prediction of diabetes. Feature engineering (FE) is the way of taking forward in yielding highly informative features. Pima Indian Diabetes Dataset (PIDD) is used in this work, and the… More >

  • Open Access

    ARTICLE

    From Similarities to Probabilities: Feature Engineering for Predicting Drugs’ Adverse Reactions

    Nahla H. Barakat*, Ahmed H. ElSabbagh

    Intelligent Automation & Soft Computing, Vol.32, No.2, pp. 1207-1224, 2022, DOI:10.32604/iasc.2022.022104 - 17 November 2021

    Abstract Social media recently became convenient platforms for different groups with common concerns to share their experiences, including Adverse Drug Reactions (ADRs). In this paper, we propose a two stage intelligent algorithm which we call “Simi_to_Prob”, that utilizes social media forums; for ranking ADRs, and evaluating the ADRs prevalence considering different age and gender groups as its first stage. In the second stage, ADRs are predicted utilizing a different data set from the Food and Drug Administration (FDA). In particular, Natural Language Processing (NLP) is used on social media to extract ranked lists of ADRs, which… More >

Displaying 1-10 on page 1 of 12. Per Page