Adaptive melanoma diagnosis using evolving clustering, ensemble and deep neural networks

TY Tan, L Zhang, CP Lim - Knowledge-Based Systems, 2020 - Elsevier
In this research, we propose a variant of the Particle Swarm Optimization (PSO) algorithm,
namely hybrid learning PSO (HLPSO), for skin lesion segmentation and classification …

[HTML][HTML] Intrusion detection and prevention system for an IoT environment

A Kumar, K Abhishek, MR Ghalib, A Shankar… - Digital Communications …, 2022 - Elsevier
Abstract Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT
devices, including industrial machines, smart energy grids, and building automation, are …

An efficient evolutionary algorithm with a nearest neighbor search technique for clustering analysis

R Qaddoura, H Faris, I Aljarah - Journal of Ambient Intelligence and …, 2021 - Springer
Evolutionary algorithms have shown their powerful capabilities in different machine learning
problems including clustering which is a growing area of research nowadays. In this paper …

Graph-based clustering of extracted paraphrases for labelling crime reports

P Das, AK Das - Knowledge-Based Systems, 2019 - Elsevier
Paraphrases are well-known as synonyms that express the same context in different
articulations. Extracting paraphrases from a large text corpus is a challenging task in Natural …

Multilabel classification of remote sensed satellite imagery

A Kumar, K Abhishek, A Kumar Singh… - Transactions on …, 2021 - Wiley Online Library
Multilabel scene classification has emerged as a critical research area in the domain of
remote sensing. Contemporary classification models primarily emphasis on a single object …

[PDF][PDF] Data science for digital culture improvement in higher education using K-means clustering and text analytics.

DS Maylawati, T Priatna… - … of Electrical & …, 2020 - download.garuda.kemdikbud.go.id
This study aims to investigate the meaningful pattern that can be used to improve digital
culture in higher education based on parameters of the technology acceptance model …

Androidgyny: Reviewing clustering techniques for Android malware family classification

TSR Pimenta, F Ceschin, A Gregio - Digital Threats: Research and …, 2024 - dl.acm.org
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …

Real geo‐time‐based secured access computation model for e‐Health systems

A Kumar, K Abhishek, C Chakraborty… - Computational …, 2023 - Wiley Online Library
Abstract Role Back Access Control model (RBAC) allows devices to access cloud services
after authentication of requests. However, it does not give priority in Big Data to devices …

A survey on partitional clustering using single-objective metaheuristic approach

PP Mohanty, SK Nayak… - … Journal of Innovative …, 2019 - inderscienceonline.com
Clustering is one of the important functions of data mining, which is used to analyse a large
amount of data. It groups these set of data according to some similarity property such that …

Understanding attribute and social circle correlation in social networks

P Nerurkar, M Chandane… - Turkish Journal of …, 2019 - journals.tubitak.gov.tr
Social circles, groups, lists, etc. are functionalities that allow users of online social network
(OSN) platforms to manually organize their social media contacts. However, this facility …