Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (116)
  • Open Access

    ARTICLE

    GRU Enabled Intrusion Detection System for IoT Environment with Swarm Optimization and Gaussian Random Forest Classification

    Mohammad Shoab*, Loiy Alsbatin*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 625-642, 2024, DOI:10.32604/cmc.2024.053721 - 15 October 2024

    Abstract In recent years, machine learning (ML) and deep learning (DL) have significantly advanced intrusion detection systems, effectively addressing potential malicious attacks across networks. This paper introduces a robust method for detecting and categorizing attacks within the Internet of Things (IoT) environment, leveraging the NSL-KDD dataset. To achieve high accuracy, the authors used the feature extraction technique in combination with an auto-encoder, integrated with a gated recurrent unit (GRU). Therefore, the accurate features are selected by using the cuckoo search algorithm integrated particle swarm optimization (PSO), and PSO has been employed for training the features. The More >

  • Open Access

    ARTICLE

    Modern Mobile Malware Detection Framework Using Machine Learning and Random Forest Algorithm

    Mohammad Ababneh*, Ayat Al-Droos, Ammar El-Hassan

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1171-1191, 2024, DOI:10.32604/csse.2024.052875 - 13 September 2024

    Abstract With the high level of proliferation of connected mobile devices, the risk of intrusion becomes higher. Artificial Intelligence (AI) and Machine Learning (ML) algorithms started to feature in protection software and showed effective results. These algorithms are nonetheless hindered by the lack of rich datasets and compounded by the appearance of new categories of malware such that the race between attackers’ malware, especially with the assistance of Artificial Intelligence tools and protection solutions makes these systems and frameworks lose effectiveness quickly. In this article, we present a framework for mobile malware detection based on a… More >

  • Open Access

    ARTICLE

    Determination of the Pile Drivability Using Random Forest Optimized by Particle Swarm Optimization and Bayesian Optimizer

    Shengdong Cheng1, Juncheng Gao1,*, Hongning Qi2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 871-892, 2024, DOI:10.32604/cmes.2024.052830 - 20 August 2024

    Abstract Driven piles are used in many geological environments as a practical and convenient structural component. Hence, the determination of the drivability of piles is actually of great importance in complex geotechnical applications. Conventional methods of predicting pile drivability often rely on simplified physical models or empirical formulas, which may lack accuracy or applicability in complex geological conditions. Therefore, this study presents a practical machine learning approach, namely a Random Forest (RF) optimized by Bayesian Optimization (BO) and Particle Swarm Optimization (PSO), which not only enhances prediction accuracy but also better adapts to varying geological environments… More > Graphic Abstract

    Determination of the Pile Drivability Using Random Forest Optimized by Particle Swarm Optimization and Bayesian Optimizer

  • Open Access

    ARTICLE

    Detecting XSS with Random Forest and Multi-Channel Feature Extraction

    Qiurong Qin, Yueqin Li*, Yajie Mi, Jinhui Shen, Kexin Wu, Zhenzhao Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 843-874, 2024, DOI:10.32604/cmc.2024.051769 - 18 July 2024

    Abstract In the era of the Internet, widely used web applications have become the target of hacker attacks because they contain a large amount of personal information. Among these vulnerabilities, stealing private data through cross-site scripting (XSS) attacks is one of the most commonly used attacks by hackers. Currently, deep learning-based XSS attack detection methods have good application prospects; however, they suffer from problems such as being prone to overfitting, a high false alarm rate, and low accuracy. To address these issues, we propose a multi-stage feature extraction and fusion model for XSS detection based on… More >

  • Open Access

    ARTICLE

    Personalized Lower Limb Gait Reconstruction Modeling Based on RFA-ProMP

    Chunhong Zeng, Kang Lu, Zhiqin He*, Qinmu Wu

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1441-1456, 2024, DOI:10.32604/cmc.2024.051551 - 18 July 2024

    Abstract Personalized gait curves are generated to enhance patient adaptability to gait trajectories used for passive training in the early stage of rehabilitation for hemiplegic patients. The article utilizes the random forest algorithm to construct a gait parameter model, which maps the relationship between parameters such as height, weight, age, gender, and gait speed, achieving prediction of key points on the gait curve. To enhance prediction accuracy, an attention mechanism is introduced into the algorithm to focus more on the main features. Meanwhile, to ensure high similarity between the reconstructed gait curve and the normal one, More >

  • Open Access

    ARTICLE

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

    Yi-Chun Lai1, Shu-Yin Chiang2, Yao-Chiang Kan3, Hsueh-Chun Lin4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3783-3803, 2024, DOI:10.32604/cmc.2024.050376 - 20 June 2024

    Abstract Artificial intelligence (AI) technology has become integral in the realm of medicine and healthcare, particularly in human activity recognition (HAR) applications such as fitness and rehabilitation tracking. This study introduces a robust coupling analysis framework that integrates four AI-enabled models, combining both machine learning (ML) and deep learning (DL) approaches to evaluate their effectiveness in HAR. The analytical dataset comprises 561 features sourced from the UCI-HAR database, forming the foundation for training the models. Additionally, the MHEALTH database is employed to replicate the modeling process for comparative purposes, while inclusion of the WISDM database, renowned… More > Graphic Abstract

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

  • Open Access

    ARTICLE

    ABMRF: An Ensemble Model for Author Profiling Based on Stylistic Features Using Roman Urdu

    Aiman1, Muhammad Arshad1, Bilal Khan1, Khalil Khan2, Ali Mustafa Qamar3,*, Rehan Ullah Khan4

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 301-317, 2024, DOI:10.32604/iasc.2024.045402 - 21 May 2024

    Abstract This study explores the area of Author Profiling (AP) and its importance in several industries, including forensics, security, marketing, and education. A key component of AP is the extraction of useful information from text, with an emphasis on the writers’ ages and genders. To improve the accuracy of AP tasks, the study develops an ensemble model dubbed ABMRF that combines AdaBoostM1 (ABM1) and Random Forest (RF). The work uses an extensive technique that involves text message dataset pretreatment, model training, and assessment. To evaluate the effectiveness of several machine learning (ML) algorithms in classifying age… More >

  • Open Access

    ARTICLE

    A Hybrid Manufacturing Process Monitoring Method Using Stacked Gated Recurrent Unit and Random Forest

    Chao-Lung Yang1,*, Atinkut Atinafu Yilma1,2, Bereket Haile Woldegiorgis2, Hendrik Tampubolon3,4, Hendri Sutrisno5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 233-254, 2024, DOI:10.32604/iasc.2024.043091 - 21 May 2024

    Abstract This study proposed a new real-time manufacturing process monitoring method to monitor and detect process shifts in manufacturing operations. Since real-time production process monitoring is critical in today’s smart manufacturing. The more robust the monitoring model, the more reliable a process is to be under control. In the past, many researchers have developed real-time monitoring methods to detect process shifts early. However, these methods have limitations in detecting process shifts as quickly as possible and handling various data volumes and varieties. In this paper, a robust monitoring model combining Gated Recurrent Unit (GRU) and Random… More >

  • Open Access

    ARTICLE

    Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration

    Aiman1, Muhammad Arshad1,*, Bilal Khan1, Sadique Ahmad2,*, Muhammad Asim2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3333-3353, 2024, DOI:10.32604/cmc.2024.049254 - 15 May 2024

    Abstract Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personal information, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic, semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, and marketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French, etc. However, the research on Roman Urdu is not up to the mark. Hence, this study focuses on detecting the author’s age and gender based on Roman Urdu text messages.… More >

  • Open Access

    ARTICLE

    Harnessing ML and GIS for Seismic Vulnerability Assessment and Risk Prioritization

    Shalu1, Twinkle Acharya1, Dhwanilnath Gharekhan1,*, Dipak Samal2

    Revue Internationale de Géomatique, Vol.33, pp. 111-134, 2024, DOI:10.32604/rig.2024.051788 - 15 May 2024

    Abstract Seismic vulnerability modeling plays a crucial role in seismic risk assessment, aiding decision-makers in pinpointing areas and structures most prone to earthquake damage. While machine learning (ML) algorithms and Geographic Information Systems (GIS) have emerged as promising tools for seismic vulnerability modeling, there remains a notable gap in comprehensive geospatial studies focused on India. Previous studies in seismic vulnerability modeling have primarily focused on specific regions or countries, often overlooking the unique challenges and characteristics of India. In this study, we introduce a novel approach to seismic vulnerability modeling, leveraging ML and GIS to address… More >

Displaying 1-10 on page 1 of 116. Per Page