International Journal of Information Systems and Supply Chain Management,
Journal Year:
2024,
Volume and Issue:
17(1), P. 1 - 15
Published: June 5, 2024
E-commerce
has
grown
quickly
in
recent
years
thanks
to
advancements
Internet
and
information
technologies.
For
the
majority
of
consumers,
online
shopping
emerged
as
a
primary
mode
shopping.
However,
it
become
more
challenging
for
businesses
satisfy
consumer
demand
due
their
increasingly
individualized
wants.
To
address
need
customized
products
with
numerous
kinds
small
quantities,
must
rebuild
supply
chain
systems
increase
efficiency
adaptability.
The
SI-LSF
technique,
which
employs
boosting
learning
target-relative
feature
space
lower
prediction
error
enhance
algorithm's
capacity
handle
input-output
interactions,
is
validated
this
study
using
genuine
industrial
dataset.
successfully
identifies
relationship
between
sales
well
target-specific
features
by
applying
multi-objective
regression
integration
algorithm
based
on
label-specific
real-world
scenario.
Nonlinear Engineering,
Journal Year:
2025,
Volume and Issue:
14(1)
Published: Jan. 1, 2025
Abstract
The
research
aims
to
solve
the
problem
of
data
synchronization
and
redundancy
in
building
information
model
co-design
with
blockchain
technology.
A
hyper-ledger
fabric
federated
blockchain,
combined
a
revolving
door
compression
algorithm,
is
used
for
construction
an
intelligent
model.
Experiments
showed
that
method
outperformed
other
technologies
terms
throughput
response
time,
block-out
time
reduced
by
19.31%
transaction
increased
12.38%.
proposes
innovative
cycle
division
mechanism
utilizes
algorithm
maintenance
model,
thereby
enhancing
security
design
efficiency
collaboration.
This
positive
significance
design.
However,
limitation
study
only
blockchain-based
designed,
further
development
example
validation
are
needed
future.
Intelligent Systems with Applications,
Journal Year:
2024,
Volume and Issue:
23, P. 200407 - 200407
Published: June 15, 2024
Internet
of
Things
(IoT)
devices
are
extensively
utilized
but
susceptible
to
cyberattacks,
posing
significant
security
challenges.
To
mitigate
these
threats,
machine
learning
techniques
have
been
implemented
for
network
intrusion
detection
in
IoT
environments.
These
commonly
employ
various
feature
reduction
methods,
prior
inputting
data
into
models,
order
enhance
the
efficiency
processes
meet
real-time
requirements.
This
study
provides
a
comprehensive
comparison
selection
(FS)
and
extraction
(FE)
systems
(NIDS)
environments,
utilizing
TON-IoT
BoT-IoT
datasets
both
binary
multi-class
classification
tasks.
We
evaluated
FS
including
Pearson
correlation
Chi-square,
FE
such
as
Principal
Component
Analysis
(PCA)
Autoencoders
(AE),
across
five
classic
models:
Decision
Tree
(DT),
Random
Forest
(RF),
Naive
Bayes
(NB),
k-Nearest
Neighbors
(kNN),
Multi-Layer
Perceptron
(MLP).
Our
analysis
revealed
that
generally
achieve
higher
accuracy
robustness
compared
with
RF
paired
AE
delivering
superior
performance
despite
computational
demands.
DTs
most
effective
smaller
sets,
while
MLPs
excel
larger
sets.
Chi-square
is
identified
efficient
method,
balancing
efficiency,
whereas
PCA
outperforms
runtime
efficiency.
The
also
highlights
methods
more
complex
less
sensitive
set
size,
show
improvements
informative
features.
Despite
costs
they
demonstrate
greater
capability
detect
diverse
attack
types,
making
them
particularly
suitable
findings
crucial
academic
research
industry
applications,
providing
insights
optimizing
NIDS
networks.
Automatika,
Journal Year:
2023,
Volume and Issue:
65(1), P. 250 - 260
Published: Dec. 27, 2023
Hackers
nowadays
employ
botnets
to
undertake
cyberattacks
towards
the
Internet
of
Things
(IoT)
by
illegally
exploiting
scattered
network's
resources
computing
devices.
Several
Machine
Learning
(ML)
and
Deep
(DL)
methods
for
detecting
botnet
(BN)
assaults
in
IoT
networks
have
recently
been
proposed.
However,
training
set,
severely
imbalanced
network
traffic
data
degrades
classification
performances
state-of-the-art
ML
as
well
DL
algorithm,
particularly
classes
with
very
few
samples.
The
Convolutional
Neural
Network
-Pelican
Optimization
System
(CNN-POA)
is
a
relied
attack
detection
algorithm
developed
this
research.
Meanwhile,
typical
evaluation
markers
are
used
compare
overall
performance
proposed
CNN-POA
additional
frequently
employed
algorithms.
simulation
results
suggest
that
method
effective
dependable
intrusion
attacks.
Experiments
revealed
suggested
approach
outperformed
number
current
metaheuristic
algorithms,
an
accuracy
99.5%.
Research Square (Research Square),
Journal Year:
2023,
Volume and Issue:
unknown
Published: April 7, 2023
Abstract
Optimization
is
necessary
for
solving
and
improving
the
solution
of
various
complex
problems.
Every
meta-heuristic
algorithm
can
have
a
weak
point,
multiple
mechanisms
methods
be
used
to
overcome
these
weaknesses.
We
use
hybrid
algorithms
arrive
at
an
efficient
algorithm.
This
paper
presents
new
intelligent
approach
by
hybridizing
using
different
simultaneously
without
significantly
increasing
time
complexity.
For
this
purpose,
two
algorithms,
Salp
Swarm
Optimization(SSO)
African
Vulture
Algorithm
(AVOA)
been
hybridized.
And
improve
optimization
process
Modified
Choice
Function
Learning
Automata
mechanisms.
In
addition,
other
mechanisms,
named
Opposition-Based
(OBL)
β-hill
climbing
(BHC)
technique,
presented
integrated
with
AVOA-SSA
Fifty-two
standard
benchmarks
were
test
evaluate
Finally,
improved
version
Extreme
Machine(ELM)
classifier
has
real
stock
market
data
prediction.
The
obtained
results
indicate
excellent
acceptable
performance
in
`solving
problems
able
achieve
high-quality
solutions.
Security and Privacy,
Journal Year:
2024,
Volume and Issue:
7(5)
Published: April 18, 2024
Abstract
An
IoT‐based
monitoring
system
remotely
controls
and
manages
intelligent
environments.
Due
to
wireless
communication,
deployed
sensor
nodes
are
more
vulnerable
attacks.
intrusion
detection
is
an
efficient
mechanism
detect
malicious
traffic
prevent
abnormal
activities.
This
article
suggests
framework
for
the
cold
storage
system.
The
temperature
main
parameter
that
affects
environment
harms
stored
products.
A
node
injects
false
data
manipulates
forwards
manipulated
data.
It
also
floods
neighbor
nodes.
In
this
work,
generated
collected
detection.
Two
machine
learning
techniques
have
been
applied:
supervised
(Bayesian
rough
set)
unsupervised
(micro‐clustering).
proposed
method
shows
better
performance
than
existing
methods.