SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Trends in Advanced
Computing in 2020
Advanced Computing: An International
Journal (ACIJ)
ISSN: 2229 -6727 [Online] ; 2229 - 726X [Print]
http://airccse.org/journal/acij/acij.html
CYBERSECURITY INFRASTRUCTURE AND SECURITY
AUTOMATION
Alex Mathew
Department of Computer Science & Cyber Security, Bethany College, WV, USA.
ABSTRACT
AI-based security systems utilize big data and powerful machine learning algorithms to automate
the security management task. The case study methodology is used to examine the effectiveness
of AI-enabled security solutions. The result shows that compared with the signature-based
system, AI-supported security applications are efficient, accurate, and reliable. This is because
the systems are capable of reviewing and correlating large volumes of data to facilitate the
detection and response to threats.
KEYWORDS
Automation, Cybersecurity, AI, Big data
Full Text : http://aircconline.com/acij/V10N6/10619acij01.pdf
REFERENCES
[1] AV-Comparatives, Advanced Endpoint Protection Test, AV-Comparatives, 23 March 2018,
https://www.av-comparatives.org/tests/advanced-endpoint-protection-test/
[2] IBM. “Artificial intelligence for a smarter kind of cybersecurity.” IBM, 16 August 2018,
https://www.ibm.com/security/artificial-intelligence
[3] Joshi, Naveen, “Can AI Become Our New Cybersecurity Sheriff?” Forbes, Feb. 4 2019,
https://www.forbes.com/sites/cognitiveworld/2019/02/04/can-ai-become-our-new-
cybersecuritysheriff/#6d981a6f36a8
[4] Mandt, Ej. “Integrating Cyber-Intelligence Analysis and Active Cyber-Defence Operations", Journal
of Information Warfare, vol. 16, no. 1, pp. 31-48. 2017.
[5] Mitkovskiy Alexey, Ponomarev Andrey and Proletarskiy Andrey. “SIEM-Platform for Research and
Educational Tasks on Processing of Security Information Events.” The International Scientific
Conference eLearning and Software for Education Bucharest. Vol. 3, pp 48-56. 2019.
[6] Powell, Matt. “Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?” CPO
Magazine, April 15, 2019, https://www.cpomagazine.com/cyber-security/artificial-intelligence-
acybersecurity-solution-or-the-greatest-risk-of-all/
[7] Panimalar Arockia, Pai Giri and Khan Salman, Artificial intelligence techniques for cyber security.
International Research Journal of Engineering and Technology, Vol. 5, no. 3. pp. 122-124. 2018.
[8] Siddiqui Zeeshan, Yadav Sonali and Husain Mohd. Application of Articicial Intelligence in fight
against cyber crimes: A review. International Journal of Advanced Research in Computer Science, Vol. 9,
no. 2, pp. 118-121. 2018.
[9] Starman, Adrijana. “The case study as a type of qualitative research.” Journal of contemporary
educational studies vol. 1. pp.28-43. 2013.
[10] Veeramachaneni, Kalyan and Arnaldo, Ignacio. “AI2: Training a big data machine to defend.” MIT,
[10] July 2016, https://people.csail.mit.edu/kalyan/AI2_Paper.pdf
[11] Vahakainu, Petri and Lehto, Martti. Artificial Intelligence in the Cyber Security Environment,
Academic Conferences International Limited, Reading. 2019.
AUTHOR:
Alex Mathew Ph.D., CISSP, CEH, CHFI, ECSA, MCSE, CCNA. Security+
BINARY SINE COSINE ALGORITHMS FOR FEATURE
SELECTION FROM MEDICAL DATA
Shokooh Taghian1,2 and Mohammad H. Nadimi-Shahraki1,2,*
1
Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran
2
Big Data Research Center, Najafabad Branch, Islamic Azad University, Najafabad, Iran
ABSTRACT
A well-constructed classification model highly depends on input feature subsets from a dataset,
which may contain redundant, irrelevant, or noisy features. This challenge can be worse while
dealing with medical datasets. The main aim of feature selection as a pre-processing task is to
eliminate these features and select the most effective ones. In the literature, metaheuristic
algorithms show a successful performance to find optimal feature subsets. In this paper, two
binary metaheuristic algorithms named S-shaped binary Sine Cosine Algorithm (SBSCA) and V-
shaped binary Sine Cosine Algorithm (VBSCA) are proposed for feature selection from the
medical data. In these algorithms, the search space remains continuous, while a binary position
vector is generated by two transfer functions S-shaped and V-shaped for each solution. The
proposed algorithms are compared with four latest binary optimization algorithms over five
medical datasets from the UCI repository. The experimental results confirm that using both
bSCA variants enhance the accuracy of classification on these medical datasets compared to four
other algorithms.
KEYWORDS
Medical data, Feature selection, metaheuristic algorithm, Sine Cosine Algorithm, Transfer
function.
Full Text : http://aircconline.com/acij/V10N5/10519acij01.pdf
REFERENCES
[1] S. Gu, R. Cheng, and Y. Jin, "Feature selection for high-dimensional classification using a
competitive swarm optimizer," Soft Computing, vol. 22, pp. 811-822, 2018.
[2] B. Xue, M. Zhang, W. N. Browne, and X. Yao, "A survey on evolutionary computation approaches
to feature selection," IEEE Transactions on Evolutionary Computation, vol. 20, pp. 606-626, 2015.
[3] I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," Journal of machine
learning research, vol. 3, pp. 1157-1182, 2003.
[4] H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering,"
IEEE Transactions on Knowledge & Data Engineering, pp. 491-502, 2005.
[5] M. Dash and H. Liu, "Feature selection for classification," Intelligent data analysis, vol. 1, pp. 131-
156, 1997.
[6] Y. Saeys, I. Inza, and P. Larrañaga, "A review of feature selection techniques in bioinformatics,"
bioinformatics, vol. 23, pp. 2507-2517, 2007.
[7] C. Dhaenens and L. Jourdan, Metaheuristics for big data: John Wiley & Sons, 2016.
[8] P. Luukka, "Feature selection using fuzzy entropy measures with similarity classifier," Expert
Systems with Applications, vol. 38, pp. 4600-4607, 2011.
[9] E.-G. Talbi, Metaheuristics: from design to implementation vol. 74: John Wiley & Sons, 2009.
[10] D. H. Wolpert and W. G. Macready, "No free lunch theorems for optimization," IEEE transactions
on evolutionary computation, vol. 1, pp. 67-82, 1997.
[11] R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in MHS'95.
Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995, pp.
39-43.
[12] R. Storn and K. Price, "Differential evolution–a simple and efficient heuristic for global optimization
over continuous spaces," Journal of global optimization, vol. 11, pp. 341-359, 1997.
[13] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function
optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, pp.
459-471, 2007.
[14] X.-S. Yang, "A new metaheuristic bat-inspired algorithm," in Nature inspired cooperative strategies
for optimization (NICSO 2010), ed: Springer, 2010, pp. 65-74.
[15] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, "GSA: a gravitational search algorithm,"
Information sciences, vol. 179, pp. 2232-2248, 2009.
[16] S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in Engineering
Software, vol. 69, pp. 46-61, 2014.
[17] S. Mirjalili, "SCA: a sine cosine algorithm for solving optimization problems," Knowledge-Based
Systems, vol. 96, pp. 120-133, 2016.
[18] H. Zamani, M. H. Nadimi-Shahraki, and A. H. Gandomi, "CCSA: Conscious Neighborhood-based
Crow Search Algorithm for Solving Global Optimization Problems," Applied Soft Computing, p.
105583, 2019.
[19] D. E. Goldberg, "Genetic algorithm," Search, Optimization and Machine Learning, pp. 343-349,
1989.
[20] M. Dorigo, M. Birattari, C. Blum, M. Clerc, T. Stützle, and A. Winfield, Ant Colony Optimization
and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels, Belgium, September
22-24, 2008, Proceedings vol. 5217: Springer, 2008.
[21] S. Taghian, M. H. Nadimi-Shahraki, and H. Zamani, "Comparative Analysis of Transfer Function-
based Binary Metaheuristic Algorithms for Feature Selection," in 2018 International Conference on
Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6.
[22] H. Zamani and M. H. Nadimi-Shahraki, "Swarm Intelligence Approach for Breast Cancer
Diagnosis," International Journal of Computer Applications, vol. 151, 2016.
[23] M. Banaie-Dezfouli, M. H. Nadimi-Shahraki, and H. Zamani, "A Novel Tour Planning Model using
Big Data," in 2018 International Conference on Artificial Intelligence and Data Processing (IDAP),
2018, pp. 1-6.
[24] H. G. Arjenaki, M. H. Nadimi-Shahraki, and N. Nourafza, "A low cost model for diagnosing
coronary artery disease based on effective features," International Journal of Electronics
Communication and Computer Engineering, vol. 6, pp. 93-97, 2015.
[25] E. S. Fard, K. Monfaredi, and M. H. Nadimi-Shahraki, "An Area-Optimized Chip of Ant Colony
Algorithm Design in Hardware Platform Using the Address-Based Method," International Journal of
Electrical and Computer Engineering, vol. 4, p. 989, 2014.
[26] L. K. Panwar, S. Reddy, A. Verma, B. K. Panigrahi, and R. Kumar, "Binary grey wolf optimizer for
large scale unit commitment problem," Swarm and Evolutionary Computation, vol. 38, pp. 251-266,
2018.
[27] X.-S. Yang, Nature-inspired metaheuristic algorithms: Luniver press, 2010.
[28] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, "BGSA: binary gravitational search algorithm,"
Natural Computing, vol. 9, pp. 727-745, 2010.
[29] E. Emary, H. M. Zawbaa, and A. E. Hassanien, "Binary grey wolf optimization approaches for
feature selection," Neurocomputing, vol. 172, pp. 371-381, 2016.
[30] M. M. Mafarja, D. Eleyan, I. Jaber, A. Hammouri, and S. Mirjalili, "Binary dragonfly algorithm for
feature selection," in 2017 International Conference on New Trends in Computing Sciences
(ICTCS), 2017, pp. 12-17.
[31] S. Mirjalili, "Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-
objective, discrete, and multi-objective problems," Neural Computing and Applications, vol. 27, pp.
1053-1073, 2016.
[32] H. Faris, M. M. Mafarja, A. A. Heidari, I. Aljarah, A.-Z. Ala’M, S. Mirjalili, et al., "An efficient
binary salp swarm algorithm with crossover scheme for feature selection problems," Knowledge-
Based Systems, vol. 154, pp. 43-67, 2018.
[33] S. Mirjalili and A. Lewis, "The whale optimization algorithm," Advances in engineering software,
vol. 95, pp. 51-67, 2016.
[34] H. Zamani and M.-H. Nadimi-Shahraki, "Feature selection based on whale optimization algorithm
for diseases diagnosis," International Journal of Computer Science and Information Security, vol. 14,
p. 1243, 2016.
[35] S. Arora and P. Anand, "Binary butterfly optimization approaches for feature selection," Expert
Systems with Applications, vol. 116, pp. 147-160, 2019.
[36] S. Arora, H. Singh, M. Sharma, S. Sharma, and P. Anand, "A New Hybrid Algorithm Based on Grey
Wolf Optimization and Crow Search Algorithm for Unconstrained Function Optimization and
Feature Selection," IEEE Access, vol. 7, pp. 26343-26361, 2019.
[37] M. Taradeh, M. Mafarja, A. A. Heidari, H. Faris, I. Aljarah, S. Mirjalili, et al., "An Evolutionary
Gravitational Search-based Feature Selection," Information Sciences, 2019.
[38] A. I. Hafez, H. M. Zawbaa, E. Emary, and A. E. Hassanien, "Sine cosine optimization algorithm for
feature selection," in 2016 International Symposium on INnovations in Intelligent SysTems and
Applications (INISTA), 2016, pp. 1-5.
[39] K. S. Reddy, L. K. Panwar, B. Panigrahi, and R. Kumar, "A New Binary Variant of Sine–Cosine
Algorithm: Development and Application to Solve Profit-Based Unit Commitment Problem,"
Arabian Journal for Science and Engineering, vol. 43, pp. 4041-4056, 2018.
[40] C. L. Blake and C. J. Merz, "UCI repository of machine learning databases, 1998," ed, 1998.
[41] J. Kennedy and R. C. Eberhart, "A discrete binary version of the particle swarm algorithm," in 1997
IEEE International conference on systems, man, and cybernetics. Computational cybernetics and
simulation, 1997, pp. 4104-4108.
[42] S. Mirjalili, S. M. Mirjalili, and X.-S. Yang, "Binary bat algorithm," Neural Computing and
Applications, vol. 25, pp. 663-681, 2014.
[43] M. Friedman, "The use of ranks to avoid the assumption of normality implicit in the analysis of
variance," Journal of the american statistical association, vol. 32, pp. 675-701, 1937.
AUTHORS
Dr. Mohammad-Hossein Nadimi-Shahraki received his Ph.D. in computer science-
artificial intelligence from University Putra of Malaysia (UPM) in 2010. Currently, he
is an Ass professor in faculty of computer engineering and a senior data scientist in
Big Data Research Center in Islamic Azad University of Najafabad (IAUN). His
research interests include big data analytics, data mining algorithms, medical data
mining, machine learning and metaheuristic algorithms.
Ms. Shokooh Taghian was born in Iran. She received M.S. degrees in computer
software engineering from the faculty of computer engineering in IAUN. She is
currently researching as a research assistant and developer in Big Data Research
Center in (IAUN). Her research interests focus on metaheuristic algorithms, machine
learning and medical data analysis.

Contenu connexe

Tendances

Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
Educational data mining using jmp
Educational data mining using jmpEducational data mining using jmp
Educational data mining using jmpijcsit
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing ijsc
 
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MINING
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MININGA REVIEW ON PREDICTIVE ANALYTICS IN DATA MINING
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MININGijccmsjournal
 
Integrating Web Services With Geospatial Data Mining Disaster Management for ...
Integrating Web Services With Geospatial Data Mining Disaster Management for ...Integrating Web Services With Geospatial Data Mining Disaster Management for ...
Integrating Web Services With Geospatial Data Mining Disaster Management for ...Waqas Tariq
 
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...gerogepatton
 
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...Nov 2018 Table of contents; current issue -International Journal on Soft Comp...
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...IJSCAI Journal
 
Predictive geospatial analytics using principal component regression
Predictive geospatial analytics using principal component regression Predictive geospatial analytics using principal component regression
Predictive geospatial analytics using principal component regression IJECEIAES
 
A systematic literature review of cloud
A systematic literature review of cloudA systematic literature review of cloud
A systematic literature review of cloudhiij
 
Scientific Research Group in Egypt -2017 journal publications
Scientific Research Group in Egypt  -2017 journal publicationsScientific Research Group in Egypt  -2017 journal publications
Scientific Research Group in Egypt -2017 journal publicationsAboul Ella Hassanien
 
Top 10 neural_network_papers_pdf
Top 10 neural_network_papers_pdfTop 10 neural_network_papers_pdf
Top 10 neural_network_papers_pdfgerogepatton
 
IRJET- Weather Prediction for Tourism Application using ARIMA
IRJET- Weather Prediction for Tourism Application using ARIMAIRJET- Weather Prediction for Tourism Application using ARIMA
IRJET- Weather Prediction for Tourism Application using ARIMAIRJET Journal
 

Tendances (16)

Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
Educational data mining using jmp
Educational data mining using jmpEducational data mining using jmp
Educational data mining using jmp
 
June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing  June 2020: Most Downloaded Article in Soft Computing
June 2020: Most Downloaded Article in Soft Computing
 
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MINING
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MININGA REVIEW ON PREDICTIVE ANALYTICS IN DATA MINING
A REVIEW ON PREDICTIVE ANALYTICS IN DATA MINING
 
Integrating Web Services With Geospatial Data Mining Disaster Management for ...
Integrating Web Services With Geospatial Data Mining Disaster Management for ...Integrating Web Services With Geospatial Data Mining Disaster Management for ...
Integrating Web Services With Geospatial Data Mining Disaster Management for ...
 
ICET 2016
ICET 2016ICET 2016
ICET 2016
 
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...TOP 1  CITED PAPER - International Journal of Artificial Intelligence & Appli...
TOP 1 CITED PAPER - International Journal of Artificial Intelligence & Appli...
 
Dr.DLSREDDY_Resume1
Dr.DLSREDDY_Resume1Dr.DLSREDDY_Resume1
Dr.DLSREDDY_Resume1
 
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...Nov 2018 Table of contents; current issue -International Journal on Soft Comp...
Nov 2018 Table of contents; current issue -International Journal on Soft Comp...
 
Predictive geospatial analytics using principal component regression
Predictive geospatial analytics using principal component regression Predictive geospatial analytics using principal component regression
Predictive geospatial analytics using principal component regression
 
A systematic literature review of cloud
A systematic literature review of cloudA systematic literature review of cloud
A systematic literature review of cloud
 
Scientific Research Group in Egypt -2017 journal publications
Scientific Research Group in Egypt  -2017 journal publicationsScientific Research Group in Egypt  -2017 journal publications
Scientific Research Group in Egypt -2017 journal publications
 
Top 10 neural_network_papers_pdf
Top 10 neural_network_papers_pdfTop 10 neural_network_papers_pdf
Top 10 neural_network_papers_pdf
 
Cri big data
Cri big dataCri big data
Cri big data
 
Big Data
Big Data Big Data
Big Data
 
IRJET- Weather Prediction for Tourism Application using ARIMA
IRJET- Weather Prediction for Tourism Application using ARIMAIRJET- Weather Prediction for Tourism Application using ARIMA
IRJET- Weather Prediction for Tourism Application using ARIMA
 

Similaire à Trends in Advanced Computing in 2020 - Advanced Computing: An International Journal ( ACIJ )

January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...AIRCC Publishing Corporation
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...gerogepatton
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networksijsc
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...ijesajournal
 
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptx
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptxCardiovascular Disease Prediction Using Machine Learning Approaches.pptx
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptxTaminul Islam
 
Top cited computer science and engineering survey research articles from 2016...
Top cited computer science and engineering survey research articles from 2016...Top cited computer science and engineering survey research articles from 2016...
Top cited computer science and engineering survey research articles from 2016...IJCSES Journal
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
 
Top Cited Articles in Advanced Computational Intelligence : October 2020
Top Cited Articles in Advanced Computational Intelligence : October 2020Top Cited Articles in Advanced Computational Intelligence : October 2020
Top Cited Articles in Advanced Computational Intelligence : October 2020aciijournal
 
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020IJMIT JOURNAL
 
Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...gerogepatton
 
April 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdfApril 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdfaciijournal
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technologydannyijwest
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...aciijournal
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020IJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...IJNSA Journal
 

Similaire à Trends in Advanced Computing in 2020 - Advanced Computing: An International Journal ( ACIJ ) (20)

January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...January 2024 :  Top 10 Downloaded Articles in Computer Science & Information ...
January 2024 : Top 10 Downloaded Articles in Computer Science & Information ...
 
February 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information TechnologyFebruary 2024-: Top Read Articles in Computer Science & Information Technology
February 2024-: Top Read Articles in Computer Science & Information Technology
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...New Research Articles - 2018 November Issue-International Journal of Artifici...
New Research Articles - 2018 November Issue-International Journal of Artifici...
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
Top 10 neural networks
Top 10 neural networksTop 10 neural networks
Top 10 neural networks
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
 
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptx
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptxCardiovascular Disease Prediction Using Machine Learning Approaches.pptx
Cardiovascular Disease Prediction Using Machine Learning Approaches.pptx
 
Top cited computer science and engineering survey research articles from 2016...
Top cited computer science and engineering survey research articles from 2016...Top cited computer science and engineering survey research articles from 2016...
Top cited computer science and engineering survey research articles from 2016...
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering
 
Top Cited Articles in Advanced Computational Intelligence : October 2020
Top Cited Articles in Advanced Computational Intelligence : October 2020Top Cited Articles in Advanced Computational Intelligence : October 2020
Top Cited Articles in Advanced Computational Intelligence : October 2020
 
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020
TRENDS IN FINANCIAL RISK MANAGEMENT SYSTEMS IN 2020
 
Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...Trends in covolutional neural network in 2020 - International Journal of Arti...
Trends in covolutional neural network in 2020 - International Journal of Arti...
 
April 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdfApril 2023-Top Cited Articles in ACII-24.pdf
April 2023-Top Cited Articles in ACII-24.pdf
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technology
 
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
Top cited articles 2020 - Advanced Computational Intelligence: An Internation...
 
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
Machine learning advances in 2020
Machine learning advances in 2020Machine learning advances in 2020
Machine learning advances in 2020
 

Plus de acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

Plus de acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Dernier

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 

Dernier (20)

data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

Trends in Advanced Computing in 2020 - Advanced Computing: An International Journal ( ACIJ )

  • 1. Trends in Advanced Computing in 2020 Advanced Computing: An International Journal (ACIJ) ISSN: 2229 -6727 [Online] ; 2229 - 726X [Print] http://airccse.org/journal/acij/acij.html
  • 2. CYBERSECURITY INFRASTRUCTURE AND SECURITY AUTOMATION Alex Mathew Department of Computer Science & Cyber Security, Bethany College, WV, USA. ABSTRACT AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result shows that compared with the signature-based system, AI-supported security applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and correlating large volumes of data to facilitate the detection and response to threats. KEYWORDS Automation, Cybersecurity, AI, Big data Full Text : http://aircconline.com/acij/V10N6/10619acij01.pdf
  • 3. REFERENCES [1] AV-Comparatives, Advanced Endpoint Protection Test, AV-Comparatives, 23 March 2018, https://www.av-comparatives.org/tests/advanced-endpoint-protection-test/ [2] IBM. “Artificial intelligence for a smarter kind of cybersecurity.” IBM, 16 August 2018, https://www.ibm.com/security/artificial-intelligence [3] Joshi, Naveen, “Can AI Become Our New Cybersecurity Sheriff?” Forbes, Feb. 4 2019, https://www.forbes.com/sites/cognitiveworld/2019/02/04/can-ai-become-our-new- cybersecuritysheriff/#6d981a6f36a8 [4] Mandt, Ej. “Integrating Cyber-Intelligence Analysis and Active Cyber-Defence Operations", Journal of Information Warfare, vol. 16, no. 1, pp. 31-48. 2017. [5] Mitkovskiy Alexey, Ponomarev Andrey and Proletarskiy Andrey. “SIEM-Platform for Research and Educational Tasks on Processing of Security Information Events.” The International Scientific Conference eLearning and Software for Education Bucharest. Vol. 3, pp 48-56. 2019. [6] Powell, Matt. “Artificial Intelligence: A Cybersecurity Solution or the Greatest Risk of All?” CPO Magazine, April 15, 2019, https://www.cpomagazine.com/cyber-security/artificial-intelligence- acybersecurity-solution-or-the-greatest-risk-of-all/ [7] Panimalar Arockia, Pai Giri and Khan Salman, Artificial intelligence techniques for cyber security. International Research Journal of Engineering and Technology, Vol. 5, no. 3. pp. 122-124. 2018. [8] Siddiqui Zeeshan, Yadav Sonali and Husain Mohd. Application of Articicial Intelligence in fight against cyber crimes: A review. International Journal of Advanced Research in Computer Science, Vol. 9, no. 2, pp. 118-121. 2018. [9] Starman, Adrijana. “The case study as a type of qualitative research.” Journal of contemporary educational studies vol. 1. pp.28-43. 2013. [10] Veeramachaneni, Kalyan and Arnaldo, Ignacio. “AI2: Training a big data machine to defend.” MIT, [10] July 2016, https://people.csail.mit.edu/kalyan/AI2_Paper.pdf [11] Vahakainu, Petri and Lehto, Martti. Artificial Intelligence in the Cyber Security Environment, Academic Conferences International Limited, Reading. 2019. AUTHOR: Alex Mathew Ph.D., CISSP, CEH, CHFI, ECSA, MCSE, CCNA. Security+
  • 4. BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA Shokooh Taghian1,2 and Mohammad H. Nadimi-Shahraki1,2,* 1 Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran 2 Big Data Research Center, Najafabad Branch, Islamic Azad University, Najafabad, Iran ABSTRACT A well-constructed classification model highly depends on input feature subsets from a dataset, which may contain redundant, irrelevant, or noisy features. This challenge can be worse while dealing with medical datasets. The main aim of feature selection as a pre-processing task is to eliminate these features and select the most effective ones. In the literature, metaheuristic algorithms show a successful performance to find optimal feature subsets. In this paper, two binary metaheuristic algorithms named S-shaped binary Sine Cosine Algorithm (SBSCA) and V- shaped binary Sine Cosine Algorithm (VBSCA) are proposed for feature selection from the medical data. In these algorithms, the search space remains continuous, while a binary position vector is generated by two transfer functions S-shaped and V-shaped for each solution. The proposed algorithms are compared with four latest binary optimization algorithms over five medical datasets from the UCI repository. The experimental results confirm that using both bSCA variants enhance the accuracy of classification on these medical datasets compared to four other algorithms. KEYWORDS Medical data, Feature selection, metaheuristic algorithm, Sine Cosine Algorithm, Transfer function. Full Text : http://aircconline.com/acij/V10N5/10519acij01.pdf
  • 5. REFERENCES [1] S. Gu, R. Cheng, and Y. Jin, "Feature selection for high-dimensional classification using a competitive swarm optimizer," Soft Computing, vol. 22, pp. 811-822, 2018. [2] B. Xue, M. Zhang, W. N. Browne, and X. Yao, "A survey on evolutionary computation approaches to feature selection," IEEE Transactions on Evolutionary Computation, vol. 20, pp. 606-626, 2015. [3] I. Guyon and A. Elisseeff, "An introduction to variable and feature selection," Journal of machine learning research, vol. 3, pp. 1157-1182, 2003. [4] H. Liu and L. Yu, "Toward integrating feature selection algorithms for classification and clustering," IEEE Transactions on Knowledge & Data Engineering, pp. 491-502, 2005. [5] M. Dash and H. Liu, "Feature selection for classification," Intelligent data analysis, vol. 1, pp. 131- 156, 1997. [6] Y. Saeys, I. Inza, and P. Larrañaga, "A review of feature selection techniques in bioinformatics," bioinformatics, vol. 23, pp. 2507-2517, 2007. [7] C. Dhaenens and L. Jourdan, Metaheuristics for big data: John Wiley & Sons, 2016. [8] P. Luukka, "Feature selection using fuzzy entropy measures with similarity classifier," Expert Systems with Applications, vol. 38, pp. 4600-4607, 2011. [9] E.-G. Talbi, Metaheuristics: from design to implementation vol. 74: John Wiley & Sons, 2009. [10] D. H. Wolpert and W. G. Macready, "No free lunch theorems for optimization," IEEE transactions on evolutionary computation, vol. 1, pp. 67-82, 1997. [11] R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, 1995, pp. 39-43. [12] R. Storn and K. Price, "Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces," Journal of global optimization, vol. 11, pp. 341-359, 1997. [13] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, pp. 459-471, 2007. [14] X.-S. Yang, "A new metaheuristic bat-inspired algorithm," in Nature inspired cooperative strategies for optimization (NICSO 2010), ed: Springer, 2010, pp. 65-74. [15] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, "GSA: a gravitational search algorithm," Information sciences, vol. 179, pp. 2232-2248, 2009. [16] S. Mirjalili, S. M. Mirjalili, and A. Lewis, "Grey wolf optimizer," Advances in Engineering Software, vol. 69, pp. 46-61, 2014. [17] S. Mirjalili, "SCA: a sine cosine algorithm for solving optimization problems," Knowledge-Based Systems, vol. 96, pp. 120-133, 2016.
  • 6. [18] H. Zamani, M. H. Nadimi-Shahraki, and A. H. Gandomi, "CCSA: Conscious Neighborhood-based Crow Search Algorithm for Solving Global Optimization Problems," Applied Soft Computing, p. 105583, 2019. [19] D. E. Goldberg, "Genetic algorithm," Search, Optimization and Machine Learning, pp. 343-349, 1989. [20] M. Dorigo, M. Birattari, C. Blum, M. Clerc, T. Stützle, and A. Winfield, Ant Colony Optimization and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels, Belgium, September 22-24, 2008, Proceedings vol. 5217: Springer, 2008. [21] S. Taghian, M. H. Nadimi-Shahraki, and H. Zamani, "Comparative Analysis of Transfer Function- based Binary Metaheuristic Algorithms for Feature Selection," in 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6. [22] H. Zamani and M. H. Nadimi-Shahraki, "Swarm Intelligence Approach for Breast Cancer Diagnosis," International Journal of Computer Applications, vol. 151, 2016. [23] M. Banaie-Dezfouli, M. H. Nadimi-Shahraki, and H. Zamani, "A Novel Tour Planning Model using Big Data," in 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), 2018, pp. 1-6. [24] H. G. Arjenaki, M. H. Nadimi-Shahraki, and N. Nourafza, "A low cost model for diagnosing coronary artery disease based on effective features," International Journal of Electronics Communication and Computer Engineering, vol. 6, pp. 93-97, 2015. [25] E. S. Fard, K. Monfaredi, and M. H. Nadimi-Shahraki, "An Area-Optimized Chip of Ant Colony Algorithm Design in Hardware Platform Using the Address-Based Method," International Journal of Electrical and Computer Engineering, vol. 4, p. 989, 2014. [26] L. K. Panwar, S. Reddy, A. Verma, B. K. Panigrahi, and R. Kumar, "Binary grey wolf optimizer for large scale unit commitment problem," Swarm and Evolutionary Computation, vol. 38, pp. 251-266, 2018. [27] X.-S. Yang, Nature-inspired metaheuristic algorithms: Luniver press, 2010. [28] E. Rashedi, H. Nezamabadi-Pour, and S. Saryazdi, "BGSA: binary gravitational search algorithm," Natural Computing, vol. 9, pp. 727-745, 2010. [29] E. Emary, H. M. Zawbaa, and A. E. Hassanien, "Binary grey wolf optimization approaches for feature selection," Neurocomputing, vol. 172, pp. 371-381, 2016. [30] M. M. Mafarja, D. Eleyan, I. Jaber, A. Hammouri, and S. Mirjalili, "Binary dragonfly algorithm for feature selection," in 2017 International Conference on New Trends in Computing Sciences (ICTCS), 2017, pp. 12-17. [31] S. Mirjalili, "Dragonfly algorithm: a new meta-heuristic optimization technique for solving single- objective, discrete, and multi-objective problems," Neural Computing and Applications, vol. 27, pp. 1053-1073, 2016.
  • 7. [32] H. Faris, M. M. Mafarja, A. A. Heidari, I. Aljarah, A.-Z. Ala’M, S. Mirjalili, et al., "An efficient binary salp swarm algorithm with crossover scheme for feature selection problems," Knowledge- Based Systems, vol. 154, pp. 43-67, 2018. [33] S. Mirjalili and A. Lewis, "The whale optimization algorithm," Advances in engineering software, vol. 95, pp. 51-67, 2016. [34] H. Zamani and M.-H. Nadimi-Shahraki, "Feature selection based on whale optimization algorithm for diseases diagnosis," International Journal of Computer Science and Information Security, vol. 14, p. 1243, 2016. [35] S. Arora and P. Anand, "Binary butterfly optimization approaches for feature selection," Expert Systems with Applications, vol. 116, pp. 147-160, 2019. [36] S. Arora, H. Singh, M. Sharma, S. Sharma, and P. Anand, "A New Hybrid Algorithm Based on Grey Wolf Optimization and Crow Search Algorithm for Unconstrained Function Optimization and Feature Selection," IEEE Access, vol. 7, pp. 26343-26361, 2019. [37] M. Taradeh, M. Mafarja, A. A. Heidari, H. Faris, I. Aljarah, S. Mirjalili, et al., "An Evolutionary Gravitational Search-based Feature Selection," Information Sciences, 2019. [38] A. I. Hafez, H. M. Zawbaa, E. Emary, and A. E. Hassanien, "Sine cosine optimization algorithm for feature selection," in 2016 International Symposium on INnovations in Intelligent SysTems and Applications (INISTA), 2016, pp. 1-5. [39] K. S. Reddy, L. K. Panwar, B. Panigrahi, and R. Kumar, "A New Binary Variant of Sine–Cosine Algorithm: Development and Application to Solve Profit-Based Unit Commitment Problem," Arabian Journal for Science and Engineering, vol. 43, pp. 4041-4056, 2018. [40] C. L. Blake and C. J. Merz, "UCI repository of machine learning databases, 1998," ed, 1998. [41] J. Kennedy and R. C. Eberhart, "A discrete binary version of the particle swarm algorithm," in 1997 IEEE International conference on systems, man, and cybernetics. Computational cybernetics and simulation, 1997, pp. 4104-4108. [42] S. Mirjalili, S. M. Mirjalili, and X.-S. Yang, "Binary bat algorithm," Neural Computing and Applications, vol. 25, pp. 663-681, 2014. [43] M. Friedman, "The use of ranks to avoid the assumption of normality implicit in the analysis of variance," Journal of the american statistical association, vol. 32, pp. 675-701, 1937.
  • 8. AUTHORS Dr. Mohammad-Hossein Nadimi-Shahraki received his Ph.D. in computer science- artificial intelligence from University Putra of Malaysia (UPM) in 2010. Currently, he is an Ass professor in faculty of computer engineering and a senior data scientist in Big Data Research Center in Islamic Azad University of Najafabad (IAUN). His research interests include big data analytics, data mining algorithms, medical data mining, machine learning and metaheuristic algorithms. Ms. Shokooh Taghian was born in Iran. She received M.S. degrees in computer software engineering from the faculty of computer engineering in IAUN. She is currently researching as a research assistant and developer in Big Data Research Center in (IAUN). Her research interests focus on metaheuristic algorithms, machine learning and medical data analysis.