Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Machine Learning (ML)

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (96)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(111)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
TOPSIS(83)
Financial performance(83)
Sustainability(82)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Artificial intelligence(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2184)
Indonesia(1290)
India(788)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Internet of things and intrusion detection fog computing architectures using machine learning techniques Pages 767-782 Right click to download the paper Download PDF

Authors: Maha Helal, Tariq Kashmeery, Mohammed Zakariah, Wesam Shisha

DOI: 10.5267/j.dsl.2024.9.003

Keywords: Machine Learning (ML), Internet of Things, Anomaly detection, Intrusion Detection System (IDS), Anomaly detection in IoT, Fog Computing, UNSW-NB15 dataset

Abstract:
The exponential expansion of the Internet of Things (IoT) has fundamentally transformed the way people, machines, and gadgets communicate, resulting in unparalleled levels of interconnectedness. Nevertheless, the growth of IoT has also brought up notable security obstacles, requiring the creation of strong intrusion detection systems to safeguard IoT networks against hostile actions. This study investigates the utilization of fog computing architectures in conjunction with machine learning approaches to improve the security of the IoT. The UNSW-NB15 dataset, containing an extensive range of network traffic characteristics, is used as the basis for training and assessing the machine learning models. The study specifically applies and evaluates the performance of various models, including linear regression, Ridge classifier, SGD classifier, and ensemble learning. Furthermore, the findings indicate that these models are capable of accurately identifying intrusions, with success rates of 94%, 97%, 96.60%, and 96.50%, respectively. The Ridge Classifier demonstrates exceptional accuracy, highlighting its potential for effective implementation in IoT security frameworks. The results emphasize the efficacy of combining machine learning with fog computing to tackle the distinct security obstacles faced by IoT networks. In the future, our work will prioritize optimizing these models for real-time applications, improving their scalability, and investigating more advanced ensemble strategies to enhance detection accuracy. The project intends to enhance these areas to create a comprehensive and scalable intrusion detection system that can offer strong security solutions for the growing IoT environment. This will guarantee the integrity and dependability of linked devices and systems.

Details
  • 68
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2024 | Volume: 13 | Issue: 4 | Views: 642 | Reviews: 0

 
2.

Artificial intelligence for target symptoms of Thai herbal medicine by web scraping Pages 1013-1022 Right click to download the paper Download PDF

Authors: Chairote Yaiprasert, Gorawit Yusakul

DOI: 10.5267/j.ijdns.2022.1.010

Keywords: Artificial Intelligence (AI), Machine Learning (ML), Thai Herbal Medicine (THM), Programming

Abstract:
Machine learning (ML) is implementing artificial intelligence (AI) research within medicine that has made dramatic progress in recent years. In addition to standard treatments, the role of complementary and alternative medicine should be mentioned. Traditional Thai medicine has received growing acceptance as a complementary approach to modern medicine by using local herbs. A vast amount of Thai herbal knowledge and information is freely available on the Internet. The reader must evaluate each website and decide to use trustworthy and appropriate information. This study aimed to acquire Thai herbal knowledge recorded in the Thai language system on the Internet by scraping websites using programming techniques. The knowledge was extracted with programming, and the types of Thai herbs were classified corresponding to target symptoms by the machine learning algorithm. The ML method organized the process when sufficient achievement was reached in order to give reliable and high accuracy results from the training data set. The validation of extracted knowledge was achieved by using the part-of-speech tag patterns analysis. This study showed that the programming and machine learning system was appropriate for obtaining and classifying Thai herbal medicines knowledge.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2022 | Volume: 6 | Issue: 3 | Views: 2380 | Reviews: 0

 

® 2010-2026 GrowingScience.Com