Feature selection-based intrusion detection system using genetic whale optimization algorithm and sample-based classification

A Mojtahedi, F Sorouri, AN Souha, A Molazadeh… - arXiv preprint arXiv …, 2022 - arxiv.org
Preventing and detecting intrusions and attacks on wireless networks has become an
important and serious challenge. On the other hand, due to the limited resources of wireless …

Allocating duplicate copies for IoT data in cloud computing based on harmony search algorithm

Y Jahandideh, A Mirzaei - IETE Journal of Research, 2023 - Taylor & Francis
The Internet of things (IoT) generates a plethora of data nowadays, and cloud computing has
been introduced as an efficient solution to IoT data management. A cloud resource …

A Method Based on Plants Light Absorption Spectrum and Its Use for Data Clustering

B Farnad, K Majidzadeh, M Masdari… - Journal of Bionic …, 2024 - Springer
Nature-inspired optimization algorithms refer to techniques that simulate the behavior and
ecosystem of living organisms or natural phenomena. One such technique is the …

[PDF][PDF] An aspect-level sentiment analysis based on LDA topic modeling

S Dami, R Alimardani - J Inf Syst Telecommun, 2024 - sid.ir
Sentiment analysis is a process through which the beliefs, sentiments, allusions, behaviors,
and tendencies in a written language are analyzed using Natural Language Processing …

Positioning multiple optical network units in fiber-wireless networks: An efficient hybrid K-harmonic means clustering approach

H Emami, S Pashazadeh - Optical Fiber Technology, 2024 - Elsevier
Wireless-optical broadband access network (WOBAN) or fiber-wireless (FiWi) is a robust
and cost-effective solution to provide high bandwidth network connectivity to mobile …

[PDF][PDF] Fraud detection in health insurance using a combination of feature subset selection based on squirrel optimization algorithm and nearest neighbors algorithm …

K Parnian, F Sorouri, AN Souha… - Future Generation in …, 2021 - researchgate.net
Insurance fraud is one of the most expensive financial crimes in economics. Deliberate fraud
in insurance companies that leads to the illegal payment of insurance benefits to an …

[PDF][PDF] Review of the meta-heuristic algorithms for fuzzy modeling in the classification problem

NAM Aseri, MA Ismail, AS Fakharudin… - Int J Adv Trends …, 2020 - researchgate.net
Classification is an important tool in today's world, where data is used to make all kinds of
decisions in the government, economic, and medicine sectors. Classification is a tool that …

Kümeleme algoritmalarında kullanılan farklı yöntemlere genel bakış

T Yousefi, MS Odabas, R Oktaş - Black Sea Journal of Engineering …, 2020 - dergipark.org.tr
Veri madenciliği, birçok teknik ve algoritmayı kullanarak büyük veri tabanlarından anlamlı
bilgileri çıkarma işlemidir. Veri madenciliği genellikle,“verilerde bilgi keşfi” olarak …

Text Mining for Internship Titles Clustering Using Shared Nearest Neighbor

L Zahrotun - Computer Engineering and Applications …, 2017 - comengapp.unsri.ac.id
An Internship course becomes one of many compulsory subjects in Under graduate
Program of Informatics Engineering in Ahmad Dahlan University, Yogyakarta. In the last few …

[PDF][PDF] Web Person Name Disambiguation Using Social Links and Enriched Profile Information.

H Emami, H Shirazi… - Computing & …, 2018 - cai.type.sk
In this article, we investigate the problem of cross-document person name disambiguation,
which aimed at resolving ambiguities between person names and clustering web …