Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Tags cloud » Machine learning algorithms

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (101)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Sustainability(86)
Artificial intelligence(85)
Financial performance(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Genetic Algorithm(78)
Factor analysis(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Sautma Ronni Basana(31)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(28)


» Show all authors

Countries

Iran(2190)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(477)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(105)
Peru(94)
Canada(92)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Detecting DDoS attacks using machine learning algorithms and feature selection methods Pages 2307-2318 Right click to download the paper Download PDF

Authors: Mohammed Amin Almaiah, Rana Alrawashdeh, Tayseer Alkhdour, Romel Al-Ali, Gaith Rjoub, Theyazan Aldahyani

DOI: 10.5267/j.ijdns.2024.6.001

Keywords: DDoS Attacks, Machine learning algorithms, Salp swarm algorithm (SSA), PSO, GWO, SVM, KNN, ML

Abstract:
A Distributed Denial of Service (DDoS) attack occurs when an attacker tries to disrupt a network, service or website by flooding huge numbers of packets on the internet traffic. Detecting DDoS attacks serves the goal of spotting and addressing them promptly to reduce their effects on the network, system or service being targeted. Detecting Distributed Denial of Service (DDoS) attacks is crucial, for people, companies and network managers. The detection of DDoS attacks has ranging uses in industries such as network security safeguarding websites, managing cloud services ensuring the security of online systems and services. Detecting DDoS attacks is essential for safeguarding infrastructure upholding service availability and guaranteeing the security of online systems and services. To achieve this objective, we proposed a framework to detect DDoS attacks including six steps. In step one, we start by gathering information, which includes network activity and system records, for operations as well as instances of DDoS attacks. Step two, we identify characteristics of the data collected such as patterns in network traffic, packet details, IP addresses, types of protocols used and more. Step three, we utilize algorithms for feature selection such as Salp Swarm Algorithm (SSA), Gray Wolf Algorithm (GWA), Particle Swarm Algorithm (PSO) to pinpoint the features that can distinguish between normal activities and DDoS attack patterns. After that in step four, we divide the processed dataset into sections for training and testing purposes to develop and assess the machine learning models such as SVM (support vector machine), and KNN (K-nearest neighbor). Step five we develop a classification model using machine learning techniques like decision trees, forests, support vector machines (SVM) logistic regression models or neural networks. Finally, we assess the effectiveness of models through metrics such as accuracy rates, precision levels, recall rates, and F1 scores. The results show that the proposed models achieve high results (99.9%). In summary detecting DDoS attacks is crucial for protecting networks, systems and online services against disruptions.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 1392 | Reviews: 0

 
2.

The impact of using types of artificial intelligence technology in monitoring tax payments Pages 1577-1586 Right click to download the paper Download PDF

Authors: Nidal Zaqeeba, Hamza Alqudah, Ahmad Farhan Alshirah, Abdalwali Lutfi, Mohammed Amin Almaiah, Mahmaod Alrawad

DOI: 10.5267/j.ijdns.2024.3.009

Keywords: Data Analytics Techniques AI, Machine learning algorithms, Natural language processing, Tax Payment

Abstract:
This study examines the relationship between the types of Artificial Intelligence (AI) technology employed and monitoring tax payments. A thorough literature review is conducted to examine different AI technologies in the context of tax administration. These include machine learning algorithms (MLA), natural language processing (NLP) technology, robotic process automation (RPA), explainable artificial intelligence (XAI), and advanced data analytics techniques (DAT). A variety of technologies, such as big data analytics, task automation, task automation, unstructured data analysis, and predictive modeling, are available to improve tax payment monitoring procedures. Recommendations for further study to expand our knowledge and use of AI in tax payment monitoring are included, along with the consequences of AI adoption for tax authorities, policymakers, and practitioners.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 1635 | Reviews: 0

 
3.

Comparison of machine learning algorithms for the automatic programming of computer numerical control machine Pages 1-14 Right click to download the paper Download PDF

Authors: Neelima Sharma, V.K. Chawla, N. Ram

DOI: 10.5267/j.ijdns.2019.9.003

Keywords: Artificial Intelligence, CNC Programming, Machine Learning Algorithms, Deep Belief Network, Restricted Boltzmann Machine, Support Vector Machine

Abstract:
The computer numerical control (CNC) machines are chiefly used for the production of jobs with high accuracy and high speed. The CNC machining centers perform the machining operations according to the given program instructions which are commonly programmed by a CNC programmer. In this paper, a procedure to develop an automatic CNC program for machining of different types of holes by using different machine learning algorithms is developed. The machine learning algorithms namely support vector machine (SVM) and restricted boltzmann machine algorithm (RBM) with deep belief network (DBN) are used for the au-tomatic development of CNC machining programs of different types of holes. Initially, the position and other parameters of machining operations are identified and thereafter the CNC machining program is developed by using the MATLAB application. The automatically de-veloped CNC programs are tested on a CNC simulator. It is found that the application of RBM machine learning algorithm with DBN outperforms the SVM machine learning algo-rithm for the development of automatic CNC machining program for the machining of blind holes, through holes, counterbores and countersink operations.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2020 | Volume: 4 | Issue: 1 | Views: 2553 | Reviews: 0

 

® 2010-2026 GrowingScience.Com