Filters








21 Hits in 11.6 sec

A Review on Machine Learning Approaches for Network Malicious Behavior Detection in Emerging Technologies

Mahdi Rabbani, Yongli Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, Sajjad Bagheri Baba Ahmadi, Seyedvalyallah Ayobi
2021 Entropy  
Therefore, this paper offers an exhaustive overview of different aspects of anomaly-based network intrusion detection systems (NIDSs).  ...  In addition, with regard to the detection and recognition phase, recent machine learning approaches including supervised, unsupervised, new deep and ensemble learning techniques have been comprehensively  ...  Acknowledgments: The authors would like to appreciate the anonymous reviewers for their advantageous comments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e23050529 pmid:33923125 fatcat:d7sfiqhbkzhtre3vtl74eh67qy

A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

Ansam Khraisat, Ammar Alazab
2021 Cybersecurity  
This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS  ...  It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure.  ...  The authors are grateful to the Centre for. Informatics and Applied Optimization (CIAO) for their support.  ... 
doi:10.1186/s42400-021-00077-7 fatcat:32nrdpgvkjg4ljjxc44rewc55y

Educational data mining: A survey and a data mining-based analysis of recent works

Alejandro Peña-Ayala
2014 Expert systems with applications  
Thus, as result of the selection and analysis of 240 EDM works, an EDM work profile was compiled to describe 222 EDM approaches and 18 tools.  ...  to depict EDM approaches based on descriptive and predictive models were identified.  ...  Acknowledgments The author gives testimony of the strength given by his Father, Brother Jesus, and Helper, as part of the research projects of World Outreach Light to the Nations Ministries (WOLNM).  ... 
doi:10.1016/j.eswa.2013.08.042 fatcat:4ce647o5j5gwnm46gmilw3chg4

Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security

Belal Sudqi Khater, Ainuddin Wahid Abdul Abdul Wahab, Mohd Yamani Idna Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim, Mohammad Arif Amin, Hisham A. Shehadeh
2021 Electronics  
Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device.  ...  The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling.  ...  Correspondingly, the Naive Bayes and Decision Tree Models achieved the worst results for these metrics.  ... 
doi:10.3390/electronics10141633 fatcat:uk67rjjbj5a7bl7zf2yqczue5i

How Does Learning Analytics Contribute to Prevent Students' Dropout in Higher Education: A Systematic Literature Review

Catarina Félix de Oliveira, Sónia Rolland Sobral, Maria João Ferreira, Fernando Moreira
2021 Big Data and Cognitive Computing  
We use a bibliometric and systematic study to obtain deep knowledge of the referred scientific production.  ...  The purpose of this paper is to analyse the scientific production in this area in higher education in journals indexed in Clarivate Analytics' Web of Science and Elsevier's Scopus.  ...  The algorithm sequential minimal optimisation (SMO) was used in three studies [76, 78, 79] and, also in three studies, the authors used the ensemble of classifiers gradient boosting [84, 94, 95] .  ... 
doi:10.3390/bdcc5040064 fatcat:dmpaxx4ykfh6hmqwj76kmruwaa

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper.  ...  Chronic Diseases are the most dangerous diseases for humans and have significant effects on human life. Chronic Diseases like heart disease & Diabetes are the main causes of death.  ...  option for power generation in the commercial space such that the penetration of this technology into market would improve the energy efficiency and also quality of the environment by decarbonization.  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

Attribute-aware Collaborative Filtering: Survey and Classification [article]

Wen-Hao Chen, Chin-Chi Hsu, Yi-An Lai, Vincent Liu, Mi-Yen Yeh, Shou-De Lin
2018 arXiv   pre-print
We provide the readers not only the high level mathematical interpretation of the existing works in this area but also the mathematical insight for each category of models.  ...  This paper surveys works in the past decade developing attribute-aware CF systems, and discovered that mathematically they can be classified into four different categories.  ...  Most early models select simple linear transformations, i.e., α(x) = a x, β( ) = b , γ (z) = c z which has shown recommendation boosting, but recent works consider neural networks for non-linear α, β,  ... 
arXiv:1810.08765v1 fatcat:gkjhxziqengxbog5greaziponq

Performance on Image Segmentation Resulting In Canny and MoG

Mr. S Ravikumar
2012 IOSR Journal of Computer Engineering  
The mixture of Gaussians (MoG) classifier is enhanced with feature integration model The proposed system is designed to improve the classification accuracy.  ...  Color constancy methods are largely dependent on the distribution of colors and color edges in an image. Natural image statistics and scene semantics are used in the color consistency methods.  ...  He is a Life member of Computer Society of India and a Life member of Indian Society for Technical Education.  ... 
doi:10.9790/0661-0620108 fatcat:vq7mo32nybdm5m5a5ef7aqhbky

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
For the purpose of bringing the previously separated groups and also finding new relevant groups we introduced broker discovery concept that makes use of techniques and metrics pertaining to interactive  ...  The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system.  ...  Acknowledgement It is our privilege to acknowledge with deep sense of gratitude to our project mentor, Prof.G.G.Chiddarwar for her valuable suggestions and guidance throughout our course of study and timely  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Designing an Internet Traffic Predictive Model by Applying a Signal Processing Method

Soo-Yeon Ji, Seonho Choi, Dong Hyun Jeong
2014 Journal of Network and Systems Management  
Yet achieving the optimal balance between data privacy and utility needs has been documented as an NP-hard challenge.  ...  Nevertheless, during the process of data privatization, the utility or usefulness of the privatized data diminishes.  ...  We greatly appreciate our colleagues and partners at Bowie State University, Harford County Community College, Community College of Baltimore County, and Anne Arundel Community College.  ... 
doi:10.1007/s10922-014-9335-3 fatcat:luaehrjrtjhtlj6osufvxyhmxy

Dynamic Data Mining: Methodology and Algorithms

Xiong Deng, Yike Guo, Moustafa Ghanem, UK/China Scholarships For Excellence Programme
2011
A group of working models is dynamically organized and selected for reacting to the drifting concept.  ...  DDM can be loosely defined as categorization-organization-selection of supervised ensemble models.  ...  Acknowledgements First of all, I would like to express my deepest appreciation and gratitude to my supervisors Prof. Yike  ... 
doi:10.25560/6976 fatcat:rkfknfz4wjg67ilmpfwbjhprzq

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
Thus, we survey the previous research of data hiding of compressed images to provide the representative methods and analyze their capacities and bit rates.  ...  Nowadays, data hiding in compressed images becomes more and more popular because of the rise of the social media.  ...  Patankar for guidance, helpful discussions and a careful first reading of the manuscript.  ... 
fatcat:l5qol3fgizghrkdel7sgt3qz6q

Introduction [chapter]

2016 Music Data Analysis  
The interface between the computer and statistical sciences is increasing, as each discipline seeks to harness the power and resources of the other.  ...  This series aims to foster the integration between the computer sciences and statistical, numerical, and probabilistic methods by publishing a broad range of reference works, textbooks, and handbooks.  ...  An ensemble method not discussed in this book because of space restrictions is boosting. Similar to bagging, with boosting an ensemble of classifiers is applied and aggregated.  ... 
doi:10.1201/9781315370996-5 fatcat:avooqogcpnbjngqmzuonil3exq

Proceedings of the 3rd Planning to Learn Workshop (WS9) at ECAI 2010

S.N.
2010
This may be followed by selection of informative attributes and ?nally generation of the system for the extraction of the relevant information.  ...  but related and relevant areas and outline new direc-tions for research.  ...  Acknowledgements The organization of this workshop is partially supported by the European Community 7th framework program ICT-2007.4.4 under grant number 231519 "e-Lico: An e-Laboratory for Interdisciplinary  ... 
doi:10.5167/uzh-67522 fatcat:zoakldikpbbkpeelvtsznyixgm

Proceedings of the 3rd Planning to Learn Workshop (WS9) at ECAI 2010

S.N.
2010
This may be followed by selection of informative attributes and finally generation of the system for the extraction of the relevant information.  ...  but related and relevant areas and outline new direc-tions for research.  ...  Acknowledgements The organization of this workshop is partially supported by the European Community 7th framework program ICT-2007.4.4 under grant number 231519 "e-Lico: An e-Laboratory for Interdisciplinary  ... 
doi:10.5167/uzh-44846 fatcat:mnpxl47bbjd25prex4nff5anky
« Previous Showing results 1 — 15 out of 21 results