A review of supervised machine learning algorithms
Supervised machine learning is the construction of algorithms that are able to produce
general patterns and hypotheses by using externally supplied instances to predict the fate of …
general patterns and hypotheses by using externally supplied instances to predict the fate of …
A review on conventional machine learning vs deep learning
In now days, deep learning has become a prominent and emerging research area in
computer vision applications. Deep learning permits the multiple layers models for …
computer vision applications. Deep learning permits the multiple layers models for …
Credit card fraud detection using machine learning techniques: A comparative analysis
Financial fraud is an ever growing menace with far consequences in the financial industry.
Data mining had played an imperative role in the detection of credit card fraud in online …
Data mining had played an imperative role in the detection of credit card fraud in online …
A new ensemble-based intrusion detection system for internet of things
The domain of Internet of Things (IoT) has witnessed immense adaptability over the last few
years by drastically transforming human lives to automate their ordinary daily tasks. This is …
years by drastically transforming human lives to automate their ordinary daily tasks. This is …
A Bolasso based consistent feature selection enabled random forest classification algorithm: An application to credit risk assessment
Credit risk assessment has been a crucial issue as it forecasts whether an individual will
default on loan or not. Classifying an applicant as good or bad debtor helps lender to make …
default on loan or not. Classifying an applicant as good or bad debtor helps lender to make …
Implementation of intrusion detection model for DDoS attacks in Lightweight IoT Networks
Protecting IoT networks and infrastructure is one of the top priorities in today's computing
industry because of the unnerving and exponential development in cyberattacks and …
industry because of the unnerving and exponential development in cyberattacks and …
Machine-learning-assisted security and privacy provisioning for edge computing: A survey
Edge computing (EC), is a technological game changer that has the ability to connect
millions of sensors and provide services at the device end. The broad vision of EC integrates …
millions of sensors and provide services at the device end. The broad vision of EC integrates …
5g-nidd: A comprehensive network intrusion detection dataset generated over 5g wireless network
With a plethora of new connections, features, and services introduced, the 5th generation
(5G) wireless technology reflects the development of mobile communication networks and is …
(5G) wireless technology reflects the development of mobile communication networks and is …
Hotspot diagnosis for solar photovoltaic modules using a Naive Bayes classifier
Monitoring and maintenance of photovoltaic (PV) modules are critical for a reliable and
efficient operation. Hotspots in PV modules due to various defects and operational …
efficient operation. Hotspots in PV modules due to various defects and operational …
Simultaneous multithreading: Maximizing on-chip parallelism
This paper examines simultaneous multithreading, a technique permitting several
independent threads to issue instructions to a superscalar's multiple functional units in a …
independent threads to issue instructions to a superscalar's multiple functional units in a …