Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 267

Full-Text Articles in Engineering

Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman Sep 2024

Cyber Threat Intelligence Sharing In Nigeria, Muhammad Abubakar Nainna, Julian Bass, Lee Speakman

Communications of the IIMA

Cybersecurity challenges are common in Nigeria. Sharing cyber threat intelligence is essential in addressing the extensive challenges posed by cyber threats. It also helps in meeting regulatory compliance. There are a range of impediments that prevent cyber threat intelligence sharing. We hypothesise that we want to maximise this cyber threat intelligence sharing to resist malicious attackers. Therefore, this research investigates factors influencing threat intelligence sharing in Nigeria's cyber security practitioners. To achieve this aim, we conducted research interviews with 14 cyber security practitioners using a semi-structured, open-ended interview guide, which was recorded and transcribed. We analysed the data using an …


“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din Jul 2024

“The Role Of Modern Technologies In Effective Management Of Crowds”, Ayman El-Din

Journal of Police and Legal Sciences

Scientists started to think about the importance of developing crowd management methods, because of human gatherings - in different countries - have been accompanied by lots of disasters that have killed many and resulted in many injuries. Gathering crowd data is vital in the process of managing crowds, as crowd information contributes significantly to planning and decision-making processes and increasing communication between parties interacting with them, and data collected includes "the number of crowd members, crowd density, and problems that may occur”. Technology and technical awareness play an important role in “collecting, organizing, analyzing” real-time collected data of crowd. This …


Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul Jul 2024

Authenticated Diagnosing Of Covid-19 Using Deep Learning-Based Ct Image Encryption Approach, Mohamed Attia Abdelgwad, Amira Hassan Abed, Mahmoud Bahloul

Future Computing and Informatics Journal

Researchers are motivated to use artificial intelligence in biometrics, medical imaging encryption, as well as cybersecurity due to its rapid progress. An encryption method for CT scans—which are used to diagnose COVID-19 disease—is proposed in this study. The suggested encryption method creates a connection among an individual's face picture and CT image to increase confidentiality. The simple CT picture is first enhanced with a host image. An encryption key is multiplied by the final result. This key is produced by applying a Convolutional Neural Network (CNN) to recognize characteristics from people's face photographs. Additionally, a straightforward CNN with three convolutional …


Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar May 2024

Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar

SMU Data Science Review

Blockchain technology has extended beyond its initial role as the infrastructure for cryptocurrencies to transform various industries with its decentralized and transparent ledger system. This paper examines the broad spectrum of blockchain applications beyond cryptocurrency. It explores its potential to innovate and drive change across finance, supply chain management, healthcare, real estate, and voting systems. We review recent literature, detail specific use cases, and discuss blockchain's challenges and opportunities, aiming to provide a comprehensive overview of its transformative impact. Integrating emerging technologies, scalability, regulatory considerations, and energy consumption are critical challenges to its adoption. Our findings underscore the need for …


Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu May 2024

Analysis Of Inequality In Household Internet Utilization And Policy Implications, Shanisara Chamwong, Thoedsak Chomtohsuwan, Narissara Charoenphandhu

Journal of Demography

This research investigates the pervasive inequality in household internet access and use that contributes to the digital divide. As the internet becomes an integral part of daily life, variations in access and use carry significant implications for social and economic opportunities. A quantitative approach is applied, analyzing data from The National Statistical Office of Thailand to capture a comprehensive understanding of inequality in household internet access and use, as measured by the Gini coefficient. Five aspects of internet access and use are considered as the determinants of inequality, including internet connectivity, internet affordability, internet quality, device availability, and flexibility and …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang Apr 2024

Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang

Makara Journal of Technology

Wireless devices are now being adapted for diverse purposes, such as healthcare, agriculture, transportation, and tactical operations, which present challenges in network formation owing to high device mobility. Current methods rely on discovery techniques for forming wireless sensor networks (WSNs); however, the existing research has been criticized for its high time complexity and redundant neighbor discovery process. In this study, we provide a hybrid strategy to effectively handle the difficulties of locating neighboring nodes in WSNs. Our method combines several strategies to produce precise and effective neighbor detection. Herein, shared memory–based discovery, a beacon technique, and range and distance overlap …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma Jan 2024

Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma

The Journal of Purdue Undergraduate Research

No abstract provided.


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar Jan 2024

What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar

Journal of International Technology and Information Management

This paper describes the approach and lessons learned from a co-creation process with Dutch development NGOs to create a practical and easy-to-use assessment tool for practitioners to assess the organisation's maturity level of digital transformation. For this study, we applied a design science research methodology, specifically a six-step co-creation approach suitable for developing maturity models. The digital maturity assessment tool (quick scan) created is a domain- specific digital transformation maturity tool for development NGOs rather than a generally applicable tool. This artefact was evaluated using an eight-point Requirements framework for the development of digital maturity assessment tools. By developing a …


Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa Jan 2024

Activities Tailoring Within Agile Scrum Roles: A Case Of Nigerian Healthcare Information Systems Development, Yazidu Salihu, Julian Bass, Gloria Iyawa

Journal of International Technology and Information Management

Developing quality agile healthcare information systems requires understanding regulatory compliance and evolving healthcare needs through activities tailored within agile scrum roles. Agile scrum, a widely adopted philosophy, offers significant advantages in managing software development processes. This research explores how activities within the agile scrum roles are tailored to agile healthcare information systems development within the Nigerian context. This study adopted a qualitative case study methodology and interviewed 12 agile practitioners developing healthcare information systems within Nigeria using semi-structured open-ended interview guide questions. The practitioners were selected based on a snowballing process, a sunset of purposive sampling techniques from our network …


Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni Jan 2024

Does Personality Traits And Security Habits Influence Security Of Personal Identification Numbers? The Context Of Mobile Money Services In Tanzania., Daniel Ntabagi Koloseni

Journal of International Technology and Information Management

Security is an important ingredient in financial transactions; as such, it is imperative that attention should be paid to enhancing the security habits and user behaviours of mobile payment services. Establishing a link between security habits, personality characteristics, and security behaviours provides a new dimension to studying security behaviours regarding mobile money services. Therefore, this study investigates how personality traits affect security behaviours and habits and how security habits mediate the link between personality traits and PIN security practices. The study found that conscientiousness, openness to experience, extroversion and security habits influence PIN security practices, while conscientiousness, agreeableness, and neuroticism …


Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian Jan 2024

Media And Internet Censorship In India: A Study Of Its History And Political-Economy, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Constitution, which came into force on January 26, 1950, guarantees various fundamental rights, such as the freedom of speech and expression, freedom of religion, rights to form association, as well as rights to privacy. Yet, since the adoption of the Constitution, the Indian citizen has been subject to varying degrees of media censorship and surveillance. This paper seeks to delve into the historical evolution of media and Internet censorship and surveillance in India. It shows how media censorship of varying types have existed since the British colonists introduced restrictive laws in order to expand and control the native …


Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha Dec 2023

Arduino-Based High-Frequency Signal Data Acquisition For Learning Media On Antenna And Wave Propagation Practices, Eko Marpanaji, Masduki Zakarijah, Nikko Aji Bayu Nugraha

Elinvo (Electronics, Informatics, and Vocational Education)

This paper discusses the research results on the development of learning media and the results of the feasibility test for the learning process. This study aims to: (1) obtain the design and prototype of Arduino-based high-frequency signal data acquisition learning media; (2) find out the level of feasibility of learning media that has been made for the learning process of Antenna Practice and Wave Propagation courses. The research model uses Research and Development with the ADDIE development method. The research stages in the ADDIE method are Analyze, Design, Develop, Implement, and Evaluate. The research began with the development of learning …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla Oct 2023

Towards Reliable Multi-Path Routing : An Integrated Cooperation Model For Drones, Ibtihel Baddari, Abdelhak Mesbah, Maohamed Amine Riahla

Emirates Journal for Engineering Research

Ad-hoc networks have evolved into a vital wireless communication component by offering an adaptable infrastructure suitable for various scenarios in our increasingly interconnected and mobile world. However, this adaptability also exposes these networks to security challenges, given their dynamic nature, where nodes frequently join and leave. This dynamism is advantageous but presents resource constraints and vulnerability to malicious nodes, impacting data transmission reliability and security.

In this context, this article explores the development of a secure routing protocol for Ad-hoc networks based on a cooperation reinforcement model to reduce the degradation of routing performance. We leverage the reputation of nodes …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi Oct 2023

Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi

Karbala International Journal of Modern Science

The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …


A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche Sep 2023

A Novel Approach For Enhancing Routing In Wireless Sensor Networks Using Aco Algorithm, Sihem Goumiri, Maohamed Amine Riahla, M'Hamed Hamadouche

Emirates Journal for Engineering Research

Wireless Sensors Network (WSN) is an emergent technology that aims to offer innovative capacities. In the last decade, the use of these networks increased in various fields like military, science, and health due to their fast and inexpressive deployment and installation. However, the limited sensor battery lifetime poses many technical challenges and affects essential services like routing. This issue is a hot topic of search, many researchers have proposed various routing protocols aimed at reducing the energy consumption in WSNs. The focus of this work is to investigate the effectiveness of integrating ACO algorithm with routing protocols in WSNs. Moreover, …


Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi Sep 2023

Forecasting Economic Growth And Movements With Wavelet Transform And Arima Model, Omar Alsinglawi, Omar Alsinglawi, Mohammad Aladwan, Mohammad Aladwan, Saddam Alwadi, Saddam Alwadi

Applied Mathematics & Information Sciences

This study uses historical data and modern statistical models to forecast future Gross Domestic Product (GDP) in Jordan. The Wavelet Transformation model (WT) and Autoregressive Integrated Moving Average (ARIMA) model were applied to the time series data and yielded a best-fitting result of (2,1,1) for estimating GDP between 2022-2031. The study concludes that GDP is expected to increase with a positive growth rate of around 3.22%, and recommends government agencies to monitor GDP, strengthen existing policies, and adopt necessary economic reforms to support growth. Additionally, the private sector is encouraged to enhance production tools to achieve economic growth that benefits …


Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader Sep 2023

Neutrosophic Adaptive Lsb And Deep Learning Hybrid Framework For Ecg Signal Classification, Abdallah Rezk, Ahmed S. Sakr, H. M. Abdulkader

Applied Mathematics & Information Sciences

This paper proposes a novel hybrid framework for ECG signal classification and privacy preservation. The framework includes two phases: the first phase uses LSTM+CNN with attention gate for ECG classification, while the second phase utilizes adaptive least signal bit with neutrosophic for hiding important data during transmission. The proposed framework converts data into three sets of degrees (true, false, and intermediate) using neutrosophic and passes them to an embedding layer. In the sender part, the framework hides important data in ECG signal as true and false degrees, using the intermediate set as a shared dynamic key between sender and receiver. …


Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu Sep 2023

Compatibility Of Clique Clustering Algorithm With Dimensionality Reduction, Ug ̆Ur Madran, Duygu Soyog ̆Lu

Applied Mathematics & Information Sciences

In our previous work, we introduced a clustering algorithm based on clique formation. Cliques, the obtained clusters, are constructed by choosing the most dense complete subgraphs by using similarity values between instances. The clique algorithm successfully reduces the number of instances in a data set without substantially changing the accuracy rate. In this current work, we focused on reducing the number of features. For this purpose, the effect of the clique clustering algorithm on dimensionality reduction has been analyzed. We propose a novel algorithm for support vector machine classification by combining these two techniques and applying different strategies by differentiating …