Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    Learning Vector Quantization-Based Fuzzy Rules Oversampling Method

    Jiqiang Chen, Ranran Han, Dongqing Zhang, Litao Ma*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5067-5082, 2024, DOI:10.32604/cmc.2024.051494

    Abstract Imbalanced datasets are common in practical applications, and oversampling methods using fuzzy rules have been shown to enhance the classification performance of imbalanced data by taking into account the relationship between data attributes. However, the creation of fuzzy rules typically depends on expert knowledge, which may not fully leverage the label information in training data and may be subjective. To address this issue, a novel fuzzy rule oversampling approach is developed based on the learning vector quantization (LVQ) algorithm. In this method, the label information of the training data is utilized to determine the antecedent… More >

  • Open Access

    ARTICLE

    Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection

    Amerah Alabrah*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3897-3912, 2024, DOI:10.32604/cmc.2024.048528

    Abstract The emergence of digital networks and the wide adoption of information on internet platforms have given rise to threats against users’ private information. Many intruders actively seek such private data either for sale or other inappropriate purposes. Similarly, national and international organizations have country-level and company-level private information that could be accessed by different network attacks. Therefore, the need for a Network Intruder Detection System (NIDS) becomes essential for protecting these networks and organizations. In the evolution of NIDS, Artificial Intelligence (AI) assisted tools and methods have been widely adopted to provide effective solutions. However,… More >

  • Open Access

    ARTICLE

    An Imbalanced Data Classification Method Based on Hybrid Resampling and Fine Cost Sensitive Support Vector Machine

    Bo Zhu*, Xiaona Jing, Lan Qiu, Runbo Li

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3977-3999, 2024, DOI:10.32604/cmc.2024.048062

    Abstract When building a classification model, the scenario where the samples of one class are significantly more than those of the other class is called data imbalance. Data imbalance causes the trained classification model to be in favor of the majority class (usually defined as the negative class), which may do harm to the accuracy of the minority class (usually defined as the positive class), and then lead to poor overall performance of the model. A method called MSHR-FCSSVM for solving imbalanced data classification is proposed in this article, which is based on a new hybrid… More >

  • Open Access

    ARTICLE

    Strengthening Network Security: Deep Learning Models for Intrusion Detection with Optimized Feature Subset and Effective Imbalance Handling

    Bayi Xu1, Lei Sun2,*, Xiuqing Mao2, Chengwei Liu3, Zhiyi Ding2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1995-2022, 2024, DOI:10.32604/cmc.2023.046478

    Abstract In recent years, frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace security. This paper presents a novel intrusion detection system consisting of a data preprocessing stage and a deep learning model for accurately identifying network attacks. We have proposed four deep neural network models, which are constructed using architectures such as Convolutional Neural Networks (CNN), Bi-directional Long Short-Term Memory (BiLSTM), Bidirectional Gate Recurrent Unit (BiGRU), and Attention mechanism. These models have been evaluated for their detection performance on the NSL-KDD dataset.To enhance the compatibility between the data and the More >

  • Open Access

    REVIEW

    AI Fairness–From Machine Learning to Federated Learning

    Lalit Mohan Patnaik1,5, Wenfeng Wang2,3,4,5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1203-1215, 2024, DOI:10.32604/cmes.2023.029451

    Abstract This article reviews the theory of fairness in AI–from machine learning to federated learning, where the constraints on precision AI fairness and perspective solutions are also discussed. For a reliable and quantitative evaluation of AI fairness, many associated concepts have been proposed, formulated and classified. However, the inexplicability of machine learning systems makes it almost impossible to include all necessary details in the modelling stage to ensure fairness. The privacy worries induce the data unfairness and hence, the biases in the datasets for evaluating AI fairness are unavoidable. The imbalance between algorithms’ utility and humanization More >

  • Open Access

    REVIEW

    Pharmacological effects of denervated muscle atrophy due to metabolic imbalance in different periods

    JIAYING QIU1, YAN CHANG5, WENPENG LIANG1, MENGSI LIN1, HUI XU2, WANQING XU4, QINGWEN ZHU1, HAIBO ZHANG3,*, ZHENYU ZHANG1,*

    BIOCELL, Vol.47, No.11, pp. 2351-2359, 2023, DOI:10.32604/biocell.2023.031043

    Abstract Denervation-induced skeletal muscle atrophy can potentially cause the decline in the quality of life of patients and an increased risk of mortality. Complex pathophysiological mechanisms with dynamic alterations have been documented in skeletal muscle atrophy resulting from innervation loss. Hence, an in-depth comprehension of the key mechanisms and molecules governing skeletal muscle atrophy at varying stages, along with targeted treatment and protection, becomes essential for effective atrophy management. Our preliminary research categorizes the skeletal muscle atrophy process into four stages using microarray analysis. This review extensively discusses the pathways and molecules potentially implicated in regulating… More >

  • Open Access

    ARTICLE

    A Credit Card Fraud Detection Model Based on Multi-Feature Fusion and Generative Adversarial Network

    Yalong Xie1, Aiping Li1,*, Biyin Hu2, Liqun Gao1, Hongkui Tu1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2707-2726, 2023, DOI:10.32604/cmc.2023.037039

    Abstract Credit Card Fraud Detection (CCFD) is an essential technology for banking institutions to control fraud risks and safeguard their reputation. Class imbalance and insufficient representation of feature data relating to credit card transactions are two prevalent issues in the current study field of CCFD, which significantly impact classification models’ performance. To address these issues, this research proposes a novel CCFD model based on Multifeature Fusion and Generative Adversarial Networks (MFGAN). The MFGAN model consists of two modules: a multi-feature fusion module for integrating static and dynamic behavior data of cardholders into a unified highdimensional feature… More >

  • Open Access

    ARTICLE

    A Stacked Ensemble Deep Learning Approach for Imbalanced Multi-Class Water Quality Index Prediction

    Wen Yee Wong1, Khairunnisa Hasikin1,*, Anis Salwa Mohd Khairuddin2, Sarah Abdul Razak3, Hanee Farzana Hizaddin4, Mohd Istajib Mokhtar5, Muhammad Mokhzaini Azizan6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1361-1384, 2023, DOI:10.32604/cmc.2023.038045

    Abstract A common difficulty in building prediction models with realworld environmental datasets is the skewed distribution of classes. There are significantly more samples for day-to-day classes, while rare events such as polluted classes are uncommon. Consequently, the limited availability of minority outcomes lowers the classifier’s overall reliability. This study assesses the capability of machine learning (ML) algorithms in tackling imbalanced water quality data based on the metrics of precision, recall, and F1 score. It intends to balance the misled accuracy towards the majority of data. Hence, 10 ML algorithms of its performance are compared. The classifiers… More >

  • Open Access

    ARTICLE

    Fusion of Feature Ranking Methods for an Effective Intrusion Detection System

    Seshu Bhavani Mallampati1, Seetha Hari2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1721-1744, 2023, DOI:10.32604/cmc.2023.040567

    Abstract Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks. Although extensive research was reported in IDS, detecting novel intrusions with optimal features and reducing false alarm rates are still challenging. Therefore, we developed a novel fusion-based feature importance method to reduce the high dimensional feature space, which helps to identify attacks accurately with less false alarm rate. Initially, to improve training data quality, various preprocessing techniques are… More >

  • Open Access

    ARTICLE

    A PSO Improved with Imbalanced Mutation and Task Rescheduling for Task Offloading in End-Edge-Cloud Computing

    Kaili Shao1, Hui Fu1, Ying Song2, Bo Wang3,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2259-2274, 2023, DOI:10.32604/csse.2023.041454

    Abstract To serve various tasks requested by various end devices with different requirements, end-edge-cloud (E2C) has attracted more and more attention from specialists in both academia and industry, by combining both benefits of edge and cloud computing. But nowadays, E2C still suffers from low service quality and resource efficiency, due to the geographical distribution of edge resources and the high dynamic of network topology and user mobility. To address these issues, this paper focuses on task offloading, which makes decisions that which resources are allocated to tasks for their processing. This paper first formulates the problem… More >

Displaying 1-10 on page 1 of 55. Per Page