In the digital era, cloud computing plays a significant role in scalable resource sharing to carry out seamless computing and information sharing. Securing the data, resources …
RI Farhan, AT Maolood… - Wasit Journal of Computer …, 2021 - wjcm.uowasit.edu.iq
Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in …
RI Farhan, AT Maolood, NF Hassan - Journal of Al-Qadisiyah for computer …, 2020 - iasj.net
Anomaly detection is a term refer to any abnormal behaviors, comprise security breaches of network. Deep Learning (DL) has proven its outperformance compared to machine learning …
N Dif, Z Elberrichi - … Journal of Swarm Intelligence Research (IJSIR), 2019 - igi-global.com
Feature selection is the process of identifying good performing combinations of significant features among many possibilities. This preprocess improves the classification accuracy and …
The feature selection process can be considered a problem of global combinatorial optimization in machine learning, which reduces the irrelevant, noisy, and non-contributing …
AO Bajeh, BO Funso… - FUOYE Journal of …, 2019 - academia.edu
One of the key task in data mining is the selection of relevant features from datasets with high dimensionality. This is expected to reduce the time and space complexity, and …
D Singh, BK Kumari, EJ Leavline - Indian J Comput Sci Eng (IJCSE), 2017 - ijcse.com
In recent past, the growth rate of job hunters and job opportunities are drastically increasing due to the growth of education and advancements in technology. Finding the right job for the …
Lung cancer really has no earlier symptoms other than detecting some minute features pulmonary modules of a CT input image of a patient. The World Health Organization (WHO) …
The Multi-verse optimizer (MVO) is a recently proposed algorithm, inspired by the multi- verse theories, to solve optimization problems. Despite the efficiency of MVO, and its ability …