Results for 'Intrusion Detection System'

922 found
Order:
  1.  53
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  76
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  34
    Multi-Layer Intrusion Detection Framework for IoT Systems Using Ensemble Machine Learning.Janet Yan - manuscript
    The proliferation of Internet of Things (IoT) devices has introduced a range of opportunities for enhanced connectivity, automation, and efficiency. However, the vast array of interconnected devices has also raised concerns regarding cybersecurity, particularly due to the limited resources and diverse nature of IoT devices. Intrusion detection systems (IDS) have emerged as critical tools for identifying and mitigating security threats. This paper proposes a Multi-Layer Intrusion Detection Framework for IoT systems, leveraging Ensemble Machine Learning (EML) techniques (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  35
    A Hybrid Approach for Intrusion Detection in IoT Using Machine Learning and Signature-Based Methods.Janet Yan - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  38
    Machine Learning-Based Intrusion Detection Framework for Detecting Security Attacks in Internet of Things.Jones Serena - manuscript
    The proliferation of the Internet of Things (IoT) has transformed various industries by enabling smart environments and improving operational efficiencies. However, this expansion has introduced numerous security vulnerabilities, making IoT systems prime targets for cyberattacks. This paper proposes a machine learning-based intrusion detection framework tailored to the unique characteristics of IoT environments. The framework leverages feature engineering, advanced machine learning algorithms, and real-time anomaly detection to identify and mitigate security threats effectively. Experimental results demonstrate the efficacy of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  17
    An Integrated Framework for IoT Security: Combining Machine Learning and Signature-Based Approaches for Intrusion Detection.Yan Janet - manuscript
    Internet of Things (IoT) devices have transformed various industries, enabling advanced functionalities across domains such as healthcare, smart cities, and industrial automation. However, the increasing number of connected devices has raised significant concerns regarding their security. IoT networks are highly vulnerable to a wide range of cyber threats, making Intrusion Detection Systems (IDS) critical for identifying and mitigating malicious activities. This paper proposes a hybrid approach for intrusion detection in IoT networks by combining Machine Learning (ML) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  63
    Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  95
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion (...) System (KDD Cup 99) dataset has been used to train and validate. For validation, comparison for 2 dataset (CICIDS2017 and KDD Cup 99) is done. Then, to implement the Deep learning algorithms is proposed. Method Classification using SVM algorithm Model predict is done. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  57
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  47
    Emerging Trends in Cybersecurity: Navigating the Future of Digital Protection.Anumiti Jat - 2024 - Idea of Spectrum 1 (12):1-7.
    The increasing sophistication of cyber threats necessitates innovative and proactive cybersecurity measures. This paper explores the latest trends in cybersecurity, focusing on the role of Artificial Intelligence (AI), Zero Trust security, and blockchain technology. A review of the literature highlights significant advancements and persistent challenges, including the security of Internet of Things (IoT) ecosystems and human-centric vulnerabilities. Experiments were conducted to evaluate the efficacy of machine learning-based intrusion detection systems and Zero Trust implementation in a simulated environment. Results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Performance Comparison and Implementation of Bayesian Variants for Network Intrusion Detection.Tosin Ige & Christopher Kiekintveld - 2023 - Proceedings of the IEEE 1:5.
    Bayesian classifiers perform well when each of the features is completely independent of the other which is not always valid in real world applications. The aim of this study is to implement and compare the performances of each variant of the Bayesian classifier (Multinomial, Bernoulli, and Gaussian) on anomaly detection in network intrusion, and to investigate whether there is any association between each variant’s assumption and their performance. Our investigation showed that each variant of the Bayesian algorithm blindly (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  13.  72
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  76
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  59
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  16. (1 other version)AI, Biometric Analysis, and Emerging Cheating Detection Systems: The Engineering of Academic Integrity?Jo Ann Oravec - 2022 - Education Policy Analysis Archives 175 (30):1-18.
    Abstract: Cheating behaviors have been construed as a continuing and somewhat vexing issue for academic institutions as they increasingly conduct educational processes online and impose metrics on instructional evaluation. Research, development, and implementation initiatives on cheating detection have gained new dimensions in the advent of artificial intelligence (AI) applications; they have also engendered special challenges in terms of their social, ethical, and cultural implications. An assortment of commercial cheating–detection systems have been injected into educational contexts with little input (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  17. State of the Art of Audio- and Video-Based Solutions for AAL.Slavisa Aleksic, Michael Atanasov, Jean Calleja Agius, Kenneth Camilleri, Anto Cartolovni, Pau Climent-Perez, Sara Colantonio, Stefania Cristina, Vladimir Despotovic, Hazim Kemal Ekenel, Ekrem Erakin, Francisco Florez-Revuelta, Danila Germanese, Nicole Grech, Steinunn Gróa Sigurđardóttir, Murat Emirzeoglu, Ivo Iliev, Mladjan Jovanovic, Martin Kampel, William Kearns, Andrzej Klimczuk, Lambros Lambrinos, Jennifer Lumetzberger, Wiktor Mucha, Sophie Noiret, Zada Pajalic, Rodrigo Rodriguez Perez, Galidiya Petrova, Sintija Petrovica, Peter Pocta, Angelica Poli, Mara Pudane, Susanna Spinsante, Albert Ali Salah, Maria Jose Santofimia, Anna Sigríđur Islind, Lacramioara Stoicu-Tivadar, Hilda Tellioglu & Andrej Zgank - 2022 - Alicante: University of Alicante.
    It is a matter of fact that Europe is facing more and more crucial challenges regarding health and social care due to the demographic change and the current economic context. The recent COVID-19 pandemic has stressed this situation even further, thus highlighting the need for taking action. Active and Assisted Living technologies come as a viable approach to help facing these challenges, thanks to the high potential they have in enabling remote care and support. Broadly speaking, AAL can be referred (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. COVID-19 Face Mask Detection Alert System.McDonald Moyo & Cen Yuefeng - 2022 - Computer Engineering and Intelligent Systems 13 (2):1-15.
    Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses a haar (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Detecting Health Problems Related to Addiction of Video Game Playing Using an Expert System.Samy S. Abu Naser & Mohran H. Al-Bayed - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (9):7-12.
    Today’s everyone normal life can include a normal rate of playing computer games or video games; but what about an excessive or compulsive use of video games that impact on our life? Our kids, who usually spend a lot of time in playing video games will likely have a trouble in paying attention to their school lessons. In this paper, we introduce an expert system to help users in getting the correct diagnosis of the health problem of video game (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Sarcasm Detection in Headline News using Machine and Deep Learning Algorithms.Alaa Barhoom, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (4):66-73.
    Abstract: Sarcasm is commonly used in news and detecting sarcasm in headline news is challenging for humans and thus for computers. The media regularly seem to engage sarcasm in their news headline to get the attention of people. However, people find it tough to detect the sarcasm in the headline news, hence receiving a mistaken idea about that specific news and additionally spreading it to their friends, colleagues, etc. Consequently, an intelligent system that is able to distinguish between can (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  21. Responsible Innovation in Social Epistemic Systems: The P300 Memory Detection Test and the Legal Trial.John Danaher - forthcoming - In Van den Hoven (ed.), Responsible Innovation Volume II: Concepts, Approaches, Applications. Springer.
    Memory Detection Tests (MDTs) are a general class of psychophysiological tests that can be used to determine whether someone remembers a particular fact or datum. The P300 MDT is a type of MDT that relies on a presumed correlation between the presence of a detectable neural signal (the P300 “brainwave”) in a test subject, and the recognition of those facts in the subject’s mind. As such, the P300 MDT belongs to a class of brain-based forensic technologies which have proved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  72
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Detection of Brain Tumor Using Deep Learning.Hamza Rafiq Almadhoun & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):29-47.
    Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines or software that work and reacts like humans, some of the computer activities with artificial intelligence are designed to include speech, recognition, learning, planning and problem solving. Deep learning is a collection of algorithms used in machine learning, it is part of a broad family of methods used for machine learning that are based on learning representations of data. Deep learning is used as a (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  25.  89
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  50
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Predicting Fire Alarms in Smoke Detection using Neural Networks.Maher Wissam Attia, Baraa Akram Abu Zaher, Nidal Hassan Nasser, Ruba Raed Al-Hour, Aya Haider Asfour & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (10):26-33.
    Abstract: This research paper presents the development and evaluation of a neural network-based model for predicting fire alarms in smoke detection systems. Using a dataset from Kaggle containing 15 features and 3487 samples, we trained and validated a neural network with a three-layer architecture. The model achieved an accuracy of 100% and an average error of 0.0000003. Additionally, we identified the most influential features in predicting fire alarms.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  25
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. The emergence of “truth machines”?: Artificial intelligence approaches to lie detection.Jo Ann Oravec - 2022 - Ethics and Information Technology 24 (1):1-10.
    This article analyzes emerging artificial intelligence (AI)-enhanced lie detection systems from ethical and human resource (HR) management perspectives. I show how these AI enhancements transform lie detection, followed with analyses as to how the changes can lead to moral problems. Specifically, I examine how these applications of AI introduce human rights issues of fairness, mental privacy, and bias and outline the implications of these changes for HR management. The changes that AI is making to lie detection are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  18
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Fraudulent Financial Transactions Detection Using Machine Learning.Mosa M. M. Megdad, Samy S. Abu-Naser & Bassem S. Abu-Nasser - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (3):30-39.
    It is crucial to actively detect the risks of transactions in a financial company to improve customer experience and minimize financial loss. In this study, we compare different machine learning algorithms to effectively and efficiently predict the legitimacy of financial transactions. The algorithms used in this study were: MLP Repressor, Random Forest Classifier, Complement NB, MLP Classifier, Gaussian NB, Bernoulli NB, LGBM Classifier, Ada Boost Classifier, K Neighbors Classifier, Logistic Regression, Bagging Classifier, Decision Tree Classifier and Deep Learning. The dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   26 citations  
  33.  66
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Expert System for Castor Diseases and Diagnosis.Fatima M. Salman & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):1-10.
    Background: The castor bean is a large grassy or semi-wooden shrub or small tree. Any part of the castor plant parts can suffering from a disease that weakens the ability to grow and eliminates its production. Therefore, in this paper will identify the pests and diseases present in castor culture and detect the symptoms in each disease. Also images is showing the symptom form in this disease. Objectives: The main objective of this expert system is to obtain appropriate diagnosis (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  35.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Enhancing Malicious Code Detection With Boosted N-Gram Analysis and Efficient Feature Selection.Nastooh Taheri Javan - 2024 - IEEE Access 12:147400-147421.
    A fundamental challenge in virology research lies in effectively detecting malicious code. N-gram analysis has become a cornerstone technique, but selecting the most informative features, especially for longer n-grams, remains crucial for efficient detection. This paper addresses this challenge by introducing a novel feature extraction method that leverages both adjacent and non-adjacent bi-grams, providing a richer set of information for malicious code identification. Additionally, we propose a computationally efficient feature selection approach that utilizes a genetic algorithm combined with Boosting (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Human Symmetry Uncertainty Detected by a Self-Organizing Neural Network Map.Birgitta Dresp-Langley - 2021 - Symmetry 13:299.
    Symmetry in biological and physical systems is a product of self-organization driven by evolutionary processes, or mechanical systems under constraints. Symmetry-based feature extraction or representation by neural networks may unravel the most informative contents in large image databases. Despite significant achievements of artificial intelligence in recognition and classification of regular patterns, the problem of uncertainty remains a major challenge in ambiguous data. In this study, we present an artificial neural network that detects symmetry uncertainty states in human observers. To this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. System, Hypothesis, and Experiments: Pierre-Sylvain Régis.Antonella Del Prete - 2023 - In Andrea Strazzoni & Marco Sgarbi (eds.), Reading Descartes. Consciousness, Body, and Reasoning. Florence: Firenze University Press. pp. 155-168.
    Pierre-Sylvain Régis’s Cartesianism is quite singular in seventeenth-century French philosophy. Though, can we speak of a form of experimental science in Régis’s work? After exploring his notions of ‘system’ and ‘hypothesis’, I will define his position in relation to Claude Perrault, Jacques Rohault, and the Royal Society. I argue, first, that the contrasts which traverse French science are not so much about the use of experiments but about whether or not observational data can be traced back to hypotheses and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Lung Cancer Detection Using Artificial Neural Network.Ibrahim M. Nasser & Samy S. Abu-Naser - 2019 - International Journal of Engineering and Information Systems (IJEAIS) 3 (3):17-23.
    In this paper, we developed an Artificial Neural Network (ANN) for detect the absence or presence of lung cancer in human body. Symptoms were used to diagnose the lung cancer, these symptoms such as Yellow fingers, Anxiety, Chronic Disease, Fatigue, Allergy, Wheezing, Coughing, Shortness of Breath, Swallowing Difficulty and Chest pain. They were used and other information about the person as input variables for our ANN. Our ANN established, trained, and validated using data set, which its title is “survey lung (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  40.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.M. Arul Selvan & S. Miruna Joe Amali - 2024 - Journal of Science Technology and Research 5 (1):37-42.
    Rainfall prediction is one of the challenging tasks in weather forecasting. Accurate and timely rainfall prediction can be very helpful to take effective security measures in dvance regarding: on-going construction projects, transportation activities, agricultural tasks, flight operations and flood situation, etc. Data mining techniques can effectively predict the rainfall by extracting the hidden patterns among available features of past weather data. This research contributes by providing a critical analysis and review of latest data mining techniques, used for rainfall prediction. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. An Expert System for Diagnosing Whooping Cough Using CLIPS.Abedeleilah S. Mahmum, Nidaa Wishah, Waleed Murad, Dina F. Al-Borno & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (6):1-8.
    This abstract is a synopsis of the paper "An Expert System for Diagnosing Whooping Cough Using CLIPS." The bacterium Bordetella pertussis causes whooping cough, a highly infectious respiratory ailment with several phases of symptoms. An accurate and timely diagnosis is critical for effective treatment and the avoidance of future transmission. The construction of an expert system for detecting whooping cough using the CLIPS (C Language Integrated Production System) architecture is highlighted in this abstract. The expert system (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  72
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. The Comparative Advantages of Brain-Based Lie Detection: The P300 Concealed Information Test and Pre-trial Bargaining.John Danaher - 2015 - International Journal of Evidence and Proof 19 (1).
    The lie detector test has long been treated with suspicion by the law. Recently, several authors have called this suspicion into question. They argue that the lie detector test may have considerable forensic benefits, particularly if we move past the classic, false-positive prone, autonomic nervous system-based (ANS-based) control question test, to the more reliable, brain-based, concealed information test. These authors typically rely on a “comparative advantage” argument to make their case. According to this argument, we should not be so (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Transparency in Complex Computational Systems.Kathleen A. Creel - 2020 - Philosophy of Science 87 (4):568-589.
    Scientists depend on complex computational systems that are often ineliminably opaque, to the detriment of our ability to give scientific explanations and detect artifacts. Some philosophers have s...
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  47. Automatic Attendance Monitoring System.P. Padma Rekha, V. Narendhiran, D. Amudhan, S. Ramya & N. Pavithra - 2016 - International Journal for Science and Advance Research in Technology 2 (2):23-25.
    The attendance is taken in every organization. Traditional approach for attendance is, professor calls student name & record attendance. For each lecture this is wastage of time. To avoid these losses, we are about to use automatic process which is based on image processing. In this project approach, we are using face detection & face recognition system. The first phase is pre-processing where the face detection is processed through the step image processing. It includes the face (...) and face recognition process. Second phase is feature extraction. Step by step execution of these techniques (Image Processing) helps to achieve the final output. The working of this project is to detect and recognize the face and mark the attendance for the corresponding face in the database. Input of this project is face detection and recognition and output is to mark the attendance. Our project is being presented as a solution for the Automatic Attendance Marking System. It is designed to be reliable and low power. The Automatic face detection and recognition proposed to attendance marking in database acts as the solution for the automatic attendance marking system.. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Algorithmic Political Bias in Artificial Intelligence Systems.Uwe Peters - 2022 - Philosophy and Technology 35 (2):1-23.
    Some artificial intelligence systems can display algorithmic bias, i.e. they may produce outputs that unfairly discriminate against people based on their social identity. Much research on this topic focuses on algorithmic bias that disadvantages people based on their gender or racial identity. The related ethical problems are significant and well known. Algorithmic bias against other aspects of people’s social identity, for instance, their political orientation, remains largely unexplored. This paper argues that algorithmic bias against people’s political orientation can arise in (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  49. Using Deep Learning to Detect the Quality of Lemons.Mohammed B. Karaja & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):97-104.
    Abstract: Lemons are an important fruit that have a wide range of uses and benefits, from culinary to health to household and beauty applications. Deep learning techniques have shown promising results in image classification tasks, including fruit quality detection. In this paper, we propose a convolutional neural network (CNN)-based approach for detecting the quality of lemons by analysing visual features such as colour and texture. The study aims to develop and train a deep learning model to classify lemons based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Forest Fire Detection using Deep Leaning.Mosa M. M. Megdad & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):59-65.
    Abstract: Forests are areas with a high density of trees, and they play a vital role in the health of the planet. They provide a habitat for a wide variety of plant and animal species, and they help to regulate the climate by absorbing carbon dioxide from the atmosphere. While in 2010, the world had 3.92Gha of forest cover, covering 30% of its land area, in 2019, there was a loss of forest cover of 24.2Mha according to the Global Forest (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 922