Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Machine learning

Computer Sciences

Research outputs 2022 to 2026

Publication Year

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba Apr 2024

Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba

Research outputs 2022 to 2026

Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets, and services that are vital for the functioning and well-being of a society, economy, or nation. However, the rapid proliferation and dynamism of today's cyber threats in digital environments may disrupt CI functionalities, which would have a debilitating impact on public safety, economic stability, and national security. This has led to much interest in effective cybersecurity solutions regarding automation and intelligent decision-making, where AI-based modeling is potentially significant. In this paper, we take into account “Rule-based AI” rather than other black-box solutions since model transparency, i.e., human …


Voice Synthesis Improvement By Machine Learning Of Natural Prosody, Joseph Kane, Michael N. Johnstone, Patryk Szewczyk Mar 2024

Voice Synthesis Improvement By Machine Learning Of Natural Prosody, Joseph Kane, Michael N. Johnstone, Patryk Szewczyk

Research outputs 2022 to 2026

Since the advent of modern computing, researchers have striven to make the human–computer interface (HCI) as seamless as possible. Progress has been made on various fronts, e.g., the desktop metaphor (interface design) and natural language processing (input). One area receiving attention recently is voice activation and its corollary, computer-generated speech. Despite decades of research and development, most computer-generated voices remain easily identifiable as non-human. Prosody in speech has two primary components—intonation and rhythm—both often lacking in computer-generated voices. This research aims to enhance computer-generated text-to-speech algorithms by incorporating melodic and prosodic elements of human speech. This study explores a novel …


Pdf Malware Detection: Toward Machine Learning Modeling With Explainability Analysis, G. M.Sakhawat Hossain, Kaushik Deb, Helge Janicke, Iqbal H. Sarker Jan 2024

Pdf Malware Detection: Toward Machine Learning Modeling With Explainability Analysis, G. M.Sakhawat Hossain, Kaushik Deb, Helge Janicke, Iqbal H. Sarker

Research outputs 2022 to 2026

The Portable Document Format (PDF) is one of the most widely used file types, thus fraudsters insert harmful code into victims' PDF documents to compromise their equipment. Conventional solutions and identification techniques are often insufficient and may only partially prevent PDF malware because of their versatile character and excessive dependence on a certain typical feature set. The primary goal of this work is to detect PDF malware efficiently in order to alleviate the current difficulties. To accomplish the goal, we first develop a comprehensive dataset of 15958 PDF samples taking into account the non-malevolent, malicious, and evasive behaviors of the …


Malware Detection With Artificial Intelligence: A Systematic Literature Review, Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke Jan 2024

Malware Detection With Artificial Intelligence: A Systematic Literature Review, Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke

Research outputs 2022 to 2026

In this survey, we review the key developments in the field of malware detection using AI and analyze core challenges. We systematically survey state-of-the-art methods across five critical aspects of building an accurate and robust AI-powered malware-detection model: malware sophistication, analysis techniques, malware repositories, feature selection, and machine learning vs. deep learning. The effectiveness of an AI model is dependent on the quality of the features it is trained with. In turn, the quality and authenticity of these features is dependent on the quality of the dataset and the suitability of the analysis tool. Static analysis is fast but is …


Dos/Ddos-Mqtt-Iot: A Dataset For Evaluating Intrusions In Iot Networks Using The Mqtt Protocol, Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang Jul 2023

Dos/Ddos-Mqtt-Iot: A Dataset For Evaluating Intrusions In Iot Networks Using The Mqtt Protocol, Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang

Research outputs 2022 to 2026

Adversaries may exploit a range of vulnerabilities in Internet of Things (IoT) environments. These vulnerabilities are typically exploited to carry out attacks, such as denial-of-service (DoS) attacks, either against the IoT devices themselves, or using the devices to perform the attacks. These attacks are often successful due to the nature of the protocols used in the IoT. One popular protocol used for machine-to-machine IoT communications is the Message Queueing Telemetry Protocol (MQTT). Countermeasures for attacks against MQTT include testing defenses with existing datasets. However, there is a lack of real-world test datasets in this area. For this reason, this paper …


A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang May 2023

A Comprehensive Review On Machine Learning In Healthcare Industry: Classification, Restrictions, Opportunities And Challenges, Qi An, Saifur Rahman, Jingwen Zhou, James Jin Kang

Research outputs 2022 to 2026

Recently, various sophisticated methods, including machine learning and artificial intelligence, have been employed to examine health-related data. Medical professionals are acquiring enhanced diagnostic and treatment abilities by utilizing machine learning applications in the healthcare domain. Medical data have been used by many researchers to detect diseases and identify patterns. In the current literature, there are very few studies that address machine learning algorithms to improve healthcare data accuracy and efficiency. We examined the effectiveness of machine learning algorithms in improving time series healthcare metrics for heart rate data transmission (accuracy and efficiency). In this paper, we reviewed several machine learning …


A Review On Deep-Learning-Based Cyberbullying Detection, Md Tarek Hasan, Md Al Emran Hossain, Md Saddam Hossain Mukta, Arifa Akter, Mohiuddin Ahmed, Salekul Islam May 2023

A Review On Deep-Learning-Based Cyberbullying Detection, Md Tarek Hasan, Md Al Emran Hossain, Md Saddam Hossain Mukta, Arifa Akter, Mohiuddin Ahmed, Salekul Islam

Research outputs 2022 to 2026

Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying detection is a pressing need in today’s world, as the prevalence of cyberbullying is continually growing, resulting in mental health issues. Conventional machine learning models were previously used to identify cyberbullying. However, current research demonstrates that deep learning surpasses traditional machine learning algorithms in identifying cyberbullying for several reasons, including handling extensive data, efficiently classifying text and images, extracting features automatically through hidden layers, …


Leveraging Machine Learning To Analyze Sentiment From Covid-19 Tweets: A Global Perspective, Md Mahbubar Rahman, Nafiz Imtiaz Khan, Iqbal H. Sarker, Mohiuddin Ahmed, Muhammad Nazrul Islam Jan 2023

Leveraging Machine Learning To Analyze Sentiment From Covid-19 Tweets: A Global Perspective, Md Mahbubar Rahman, Nafiz Imtiaz Khan, Iqbal H. Sarker, Mohiuddin Ahmed, Muhammad Nazrul Islam

Research outputs 2022 to 2026

Since the advent of the worldwide COVID-19 pandemic, analyzing public sentiment has become one of the major concerns for policy and decision-makers. While the priority is to curb the spread of the virus, mass population (user) sentiment analysis is equally important. Though sentiment analysis using different state-of-the-art technologies has been focused on during the COVID-19 pandemic, the reasons behind the variations in public sentiment are yet to be explored. Moreover, how user sentiment varies due to the COVID-19 pandemic from a cross-country perspective has been less focused on. Therefore, the objectives of this study are: to identify the most effective …


A Survey On Artificial Intelligence-Based Acoustic Source Identification, Ruba Zaheer, Iftekhar Ahmad, Daryoush Habibi, Kazi Y. Islam, Quoc Viet Phung Jan 2023

A Survey On Artificial Intelligence-Based Acoustic Source Identification, Ruba Zaheer, Iftekhar Ahmad, Daryoush Habibi, Kazi Y. Islam, Quoc Viet Phung

Research outputs 2022 to 2026

The concept of Acoustic Source Identification (ASI), which refers to the process of identifying noise sources has attracted increasing attention in recent years. The ASI technology can be used for surveillance, monitoring, and maintenance applications in a wide range of sectors, such as defence, manufacturing, healthcare, and agriculture. Acoustic signature analysis and pattern recognition remain the core technologies for noise source identification. Manual identification of acoustic signatures, however, has become increasingly challenging as dataset sizes grow. As a result, the use of Artificial Intelligence (AI) techniques for identifying noise sources has become increasingly relevant and useful. In this paper, we …


Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang Dec 2022

Enhanced Heart Rate Prediction Model Using Damped Least-Squares Algorithm, Angela An, Mohammad Al-Fawa’Reh, James Jin Kang

Research outputs 2022 to 2026

Monitoring a patient’s vital signs is considered one of the most challenging problems in telehealth systems, especially when patients reside in remote locations. Companies now use IoT devices such as wearable devices to participate in telehealth systems. However, the steady adoption of wearables can result in a significant increase in the volume of data being collected and transmitted. As these devices run on limited battery power, they can run out of power quickly due to the high processing requirements of the device for data collection and transmission. Given the importance of medical data, it is imperative that all transmitted data …