Data clustering: application and trends

GJ Oyewole, GA Thopil - Artificial Intelligence Review, 2023 - Springer
Clustering has primarily been used as an analytical technique to group unlabeled data for
extracting meaningful information. The fact that no clustering algorithm can solve all …

A comprehensive review of high throughput phenotyping and machine learning for plant stress phenotyping

T Gill, SK Gill, DK Saini, Y Chopra, JP de Koff… - Phenomics, 2022 - Springer
During the last decade, there has been rapid adoption of ground and aerial platforms with
multiple sensors for phenotyping various biotic and abiotic stresses throughout the …

Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system

A Fatani, A Dahou, MAA Al-Qaness, S Lu, MA Elaziz - Sensors, 2021 - mdpi.com
Developing cyber security is very necessary and has attracted considerable attention from
academy and industry organizations worldwide. It is also very necessary to provide …

Intrusion detection system for IoT based on deep learning and modified reptile search algorithm

A Dahou, M Abd Elaziz, SA Chelloug… - Computational …, 2022 - Wiley Online Library
This study proposes a novel framework to improve intrusion detection system (IDS)
performance based on the data collected from the Internet of things (IoT) environments. The …

Towards deep-learning-driven intrusion detection for the internet of things

G Thamilarasu, S Chawla - Sensors, 2019 - mdpi.com
Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices,
applications, and communication networks are becoming increasingly connected and …

An improved marine predators algorithm with fuzzy entropy for multi-level thresholding: real world example of COVID-19 CT image segmentation

M Abd Elaziz, AA Ewees, D Yousri, HSN Alwerfali… - Ieee …, 2020 - ieeexplore.ieee.org
Medical imaging techniques play a critical role in diagnosing diseases and patient
healthcare. They help in treatment, diagnosis, and early detection. Image segmentation is …

[HTML][HTML] Intrusion detection system in cloud environment: Literature survey & future research directions

S Lata, D Singh - International Journal of Information Management Data …, 2022 - Elsevier
The cloud provides infrastructure, applications, and storage services to users that need to be
protected by some policies or procedures. Hence, security in the cloud is to protect user data …

Performance comparison of heuristic algorithms for task scheduling in IaaS cloud computing environment

SHH Madni, MS Abd Latiff, M Abdullahi… - PloS one, 2017 - journals.plos.org
Cloud computing infrastructure is suitable for meeting computational needs of large task
sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be …

Nlp based machine learning approaches for text summarization

S Adhikari - 2020 Fourth International Conference on …, 2020 - ieeexplore.ieee.org
Due to the plethora of data available today, text summarization has become very essential to
gain just the right amount of information from huge texts. We see long articles in news …

RSU-based online intrusion detection and mitigation for VANET

A Haydari, Y Yilmaz - Sensors, 2022 - mdpi.com
Secure vehicular communication is a critical factor for secure traffic management. Effective
security in intelligent transportation systems (ITS) requires effective and timely intrusion …