Optimal Deep Learning-based Cyberattack Detection and Classification Technique on Social Networks
2022-08-24AmaniAbdulrahmanAlbraikanSiwarBenHajHassineSulimanMohamedFatiFahdAlWesabiAnwerMustafaHilalAbdelwahedMotwakelManarAhmedHamzaandMesferAlDuhayyim
Amani Abdulrahman Albraikan, Siwar Ben Haj Hassine, Suliman Mohamed Fati,Fahd N.Al-Wesabi,4, Anwer Mustafa Hilal, Abdelwahed Motwakel, Manar Ahmed Hamzaand Mesfer Al Duhayyim
1Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, 11671, Saudi Arabia
2Department of Computer Science, College of Science and Arts, King Khalid University, Mahayil Asir, Saudi Arabia
3Department of Information Systems, College of Computer and Information Sciences, Prince Sultan University,Saudi Arabia
4Faculty of Computer and IT, Sana’a University, Sana’a, Yemen
5Department of Computer and Self-Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University,AlKharj, Saudi Arabia
6Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University,Saudi Arabia
Abstract: Cyberbullying (CB) is a distressing online behavior that disturbs mental health significantly.Earlier studies have employed statistical and Machine Learning (ML) techniques for CB detection.With this motivation,the current paper presents an Optimal Deep Learning-based Cyberbullying Detection and Classification (ODL-CDC) technique for CB detection in social networks.The proposed ODL-CDC technique involves different processes such as pre-processing, prediction, and hyperparameter optimization.In addition, GloVe approach is employed in the generation of word embedding.Besides,the pre-processed data is fed into Bidirectional Gated Recurrent Neural Network(BiGRNN)model for prediction.Moreover,hyperparameter tuning of BiGRNN model is carried out with the help of Search and Rescue Optimization (SRO) algorithm.In order to validate the improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out upon benchmark dataset and the results were inspected under varying aspects.A detailed comparative study portrayed the superiority of the proposed ODL-CDC technique over recent techniques, in terms of performance, with the maximum accuracy of 92.45%.
Keywords: Cybersecurity; cyberbullying; social networks; parameter tuning;deep learning; metaheuristics
1 Introduction
There has been a tremendous increase observed in online activities in the recent years among teenagers.This phenomenon is prevalently found in social media platforms that consistently expose teenagers to Cyber Bullying (CB).Bullying can be determined as an aggressive and intentional behaviour/act which is performed repeatedly by an individual or a group against victim(s) who cannot protect themselves over a period of time [1].Cyberbullying has been documented as a national health problem and is recognized as one of the main mental health problems owing to its continuous increase in social media and other online modes of communication [2].The negative effect of cyberbullying shares multiple similarities with conventional bullying.However, cyberbullying can be increasingly dangerous due to high propagation and frequency empowered by technology at the same time [3].Surveys conducted earlier have related cyberbullying with negative impacts on academic performance,high risk of suicidal ideation, depression psychological and physical health [4].So, early recognition of cyberbullying in social networking sites is paramount to reduce and mitigate its negative impacts upon the victim.Furthermore, the repetitive nature of cyberbullying makes it highly challenging to terminate and detect immediately.Cyber aggression, on one side, helps in detecting the aggressor and on the other side, assist the victim.
From the perspectives of cyber world, the applications with CB pose significant challenges in terms of lack of straightforward communications, consequences associated over others, self and victim’s identity, and the ignorance of aggressors [5].The failure in straightforward communications disrupts the nature of message and partial interpretation leads to confusion on the interaction messages.Further, the intention of the individual with exchange of messages becomes complicated.Though there are difficulties in identification, when detecting an individual’s behavioral intention, the main reason behind the transition of a harasser from aggression to CB is their intent to harm oneself [6].At present, authors have attempted to innovate technologies for resolving real-time challenges in cyberbullying.Nowadays, the social networking platforms are developed with an automatic behaviour that alerts the moderator to analyze the content [7].But the present architecture lacks an intelligent automation process that can alter and detect the CB content quickly with precision, when compared to conventional reporting method.
In case of an alert, the moderators respond and take the required action whereas alerts are taken against the user content [8].This study was conventionally performed on the surveyed data/accessible datasets, in which the victims/perpetrators report the impression.Highly accurate and automated recognition process is one another challenge faced in the mitigation of cyber bullying from the accessible dataset.Hence, the difficulty in recognizing activity must be improved [9].The need for advanced tools that can incorporate the features with automatic decision method is increasing.Several studies conducted upon smart CB detection used machine learning methods as well as adapted psychological and common features.However, this smart system is limited one, confined to the comments of an individual, leaving behind their context [10].Another research work reported about the usage of user contexts in action which includes the history of a user’s comments and their characteristics to enhance CB classification or detection accuracy.Currently, the studies conducted earlier have established novel technologies for automatic recognition of CB with real-time challenges.
Ptaszynski et al.[11] proposed a new approach for automated recognition of cyberbullying entries on internet.In this model, the researchers utilized seed words from three classes to analyze a semantic orientation score and later maximized the significance of classes.The presented model outperformed benchmark settings in real world and laboratory conditions.In practice, the proposed method was tested and deployed.Bozyi˘git et al.[12] developed the significance of social networking features in cyberbullying recognition.In this study, a balanced dataset was prepared that consists of 5,000 labelled contents from various social networking attributes.Next, the relationships amid cyberbullying and social networking attributes were investigated using chi-square test.For example, a user with more followers on social media are disinclined towards posting online bullying content.Consequently, ML methods were tested on two distinct kinds of the prepared dataset.
Chia et al.[13] clarified and reviewed the description of sarcasm and irony by discussing several research terms.Then, the researchers conducted early experiments by comparing different kinds of classification algorithms that involve some common classifiers for text classification process.Next,various kinds of data pre-processing models were analyzed and compared.Lastly, the relationships among cyberbullying, irony, and sarcasm were discussed.Eronen et al.[14] conducted a study using numerous datasets including common datasets like Yelp business review datasets which were utilized to train conventional SA method.Newer datasets attempted to address the problems of cyberbullying since it is a crucial social problem and a complicated problem from the perspective of linguistic representations.
Balakrishnan et al.[15] proposed an automated cyberbullying recognition method to tap the psychological characteristics of twitter users involving sentiment, emotion, and personalities.In this study,user personality has been definedby Big Fiveand Dark Triad methods,where ML classifiers like NB, RF, and J48 were utilized in the classification of twitters under four classes namely, normal, bully,aggressor, and spammer.This twitter dataset contained 5,453 tweets with the hashtag #Gamergate and was automatically annotated by human expertise.
1.1 Objectives
The major objective of this study is to develop Optimal Deep Learning based Cyberbullying Detection and Classification (ODL-CDC) technique for effective identification and classification of different kinds of cyberbullying that exist in social networking sites.
1.2 Paper Contribution
The current research work presents an Optimal Deep Learning based Cyberbullying Detection and Classification (ODL-CDC) technique for identifying cyberbullying on social networks.The proposed ODL-CDC technique involves different processes such as pre-processing, prediction, and hyperparameter optimization.In addition, GloVe approach is also employed for the generation of word embedding.Besides, the pre-processed data is fed into Bidirectional Gated Recurrent Neural Network (BiGRNN) model for prediction process.Moreover, hyperparameter tuning of BiGRNN model is carried out with the help of Search and Rescue Optimization (SRO) algorithm.In order to validate the improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out on benchmark dataset and the results were inspected under varying aspects.
1.3 Paper Organization
Rest of the sections in this paper is arranged as follows.Section 2 elaborates the proposed ODLCDC technique while the simulation results are discussed in Section 3.Finally, the concluding remarks are identified in Section 4.
2 The Proposed Model
In this study, a novelODL-CDC technique is developed to identify the presence of cyberbullying in social networking websites.The proposed ODL-CDC technique comprises of pre-processing, Glovebased word embedding, BiGRNN-based prediction, and SRO-based hyperparameter optimization.SRO algorithm is utilized for proper hyperparameter tuning of BiGRNN parameters which helps in improving the classification performance substantially.Fig.1 illustrates the overall process of ODLCDC model.
Figure 1: Overall process of ODL-CDC model
2.1 Pre-processing
In this primary stage, social networking data is pre-processed under different stages [16] such as text cleaning, tokenization, stemming, lemmatization, and stop word removal.
2.2 Glove’s Word Embedding Technique
GloVe word-embedded model is utilized in the presented technique to extract semantic features in text-on-web page.GloVe is an abbreviation of Global Vectors while GloVe embedded model has unsupervised learning technique to distributed word demonstration of the text removed in this web page.GloVe technique is easy to train the information because of its parallel execution method.It takes the semantic connections of words from vector spaces.Global co-occurrence matrix X is generated based on the words established in Wikipedia dataset to train GloVe word-embedded technique [17].
During co-occurrence matrix, X:Xijimplies the amount of context wordsithat act as word,j.GloVe technique minimizes the subsequent main function.
2.3 BiGRNN-Based Prediction
At this stage, the social networking data is classified into normal and insult by BiGRNN model.GRU-NN is a basic form of LSTM while the procedure mimics RNN.In contrast with LSTM, GRU has a combination of input as well as forgetting gates to upgrade gate.Its fundamental framework is demonstrated in Fig.2.
Figure 2: BiGRU structure
Considering that the amount of hidden units ish, a small-batch input with provided time step oftisXt∈Rn*d(the amount of instances isn, the amount of inputs isd), and the hidden state at preceding time stept1isHt-1∈Rn*h.The resultant hidden statehof singleGRUat present time steptis as follows[18]:
where σ refers to sigmoid activation function, for instance,σ(x) = 1/1 +e-x,·Wxr,Whr,WXZ, andWhzdemonstrate the weights of linking input layer and reset gate, hidden layer and reset gate, input layer and update gate, and hidden layer and update gate correspondingly;brandbzsignify the bias of reset as well as updategates;Htimplies the candidate hidingstate at presenttime step,t;⊙standsfor matrix multiplication of two elements whereasTanhrepresents the hyperbolic tangent activation function for which the equation is as follows.
If water quality time series parameter is forecasted, the value of present time is nearly connected with the values of preceding time and next time.But, GRU is a one-way NN framework due to which BiGRU is utilized.BiGRU is a bidirectional NN which is a collection of collected of forwardpropagating GRU andbackward-propagating GRU units.The present hidden layer stateHtof BiGRU is defined as presenti nputXt,theoutputof forwarding hidden layer, and the outputtofbackward hidden layer at time stept- 1, afterward,
where GRU (.) function designates that GRU network is utilized for conducting non-linear alteration on input data of water quality whereas the input vector encodes to equivalent GRU hidden state;wtandvtcorrespondingly are the weights of stateof forward hidden layer and the stateofbackward hidden layer equivalent to BiGRU at timet, andbtindicates the bias of state of the hidden layer, at timet.
2.4 SRO Based Hyperparameter Optimization
In order to have an appropriate fine tuning of the hyperparameters in BiGRNN model, SRO algorithm is utilized.Shabani et al.[19] presented SAR inspired from the research conducted upon humans at search and rescue processes.Search and rescue process comprises of two stages such as individual phase and social phase.The clues left at the time of search by a group member get stored in memory matrix (O) where the humans’position are stored from position matrix (W).The clue matrixBusing sizeN*Dleft a clue while the humans’position can be expressed in the matrix given below.
The two stages of human search aremodelled as given herewith i) social stage: The search direction is representedasSDi= (Wi-Bk)whereaski.The novel solution can be attained as given herewith..
Nowf(Bi) &f(Wi) represent the fitness function values forBi&Wi,r1&r2denote the arbitrary values in the interval of [-1, 1] and [0,1], SE denotes the model variable which lies in the range of 0 & 1.
ii) Individual Stage: According to the present human position, their novel location is found andithhuman can be represented as follows.
Each solution must be found in the solution space, when a novel location is present on the outside of solution space as mentioned herewith.
Here,MEnrepresents thenthstored clues location in memory matrix andnindicates a random integer number in the range of 1 and N.
At the time of clues’search operation, when better clues are not found near the existing location after some searches, humans move to a novel location.
While the USN value is high than the maximal unsuccessful search number, the human gets an arbitrary location in searching space as per Eq.(17) while the values ofUSNiare fixed as 0 for that human.
Here,r4lies in the range of 0 and 1.
3 Experimental Validation
The performance validation of the proposed ODL-CDC technique was carried out using Kaggle datasetwhich contains instances under two classes namely, neutral/normal (class 0) and insult (class 1).Most of the words that exist in neural statements are ‘people’, ‘like’, ‘just’, ‘make’, ‘now’, ‘right’, ‘can’, ‘one’ and ‘think’.Similarly, the words that exist in insult statements include ‘people’, ‘shit’, ‘think’, ‘idiot’, ‘life’, ‘bitch’, ‘back’ and ‘dumb’ which are the most frequent words used in bad sentences.The results were examined without hyperparameter tuning, i.e., BiGODL-CDC technique, and with hyperparameter tuning, i.e., ODL-CDC technique under different measures.
Tab.1 shows the results of classification obtained by BiGODL-CDC technique on test Kaggle dataset.The results portray that BiGODL-CDC technique accomplished an effective performance under all classes.For instance, under run-1 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 91.23%, 90.7%, and 92.98% respectively.At the same time,under run-1 with insult class, the BiGODL-CDC technique has attainedPren,Recl, andF1measureof 92.61%, 92.42%, and 92.48% correspondingly.At the same time, under run-2 with normal class,BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 91.49%, 92.26%, and 91.68% correspondingly.In linewith these, under run-2with insult class, BiGODL-CDC methodology reachedPren,Recl, andF1measurevalues like 91.39%, 92.33%, and 90.63% respectively.Followed by, under run-3 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 92.87%,92.27%, and 91.91% correspondingly.Simultaneously, under run-3 with insult class, BiGODL-CDC method attainedPren,Recl, andF1measurevalues such as 92.35%, 91.14%, and 90.76% correspondingly.Moreover, under run-4 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.12%, 92.61%, and 91.47% respectively.In addition, under run-4 with insult class,BiGODL-CDC scheme obtainedPren,Recl, andF1measurevalues such as 90.01%, 90.22%, and 91.52%correspondingly.Eventually, under run-5 with normal class, BiGODL-CDC approach obtainedPren,Recl,andF1measurevaluessuchas91.52%,91.08%,and91.32%correspondingly.Then,underrun-5with insult class, BiGODL-CDC technique gainedPren,Recl, andF1measurevalues like 92.51%, 92.76%, and 90.6% respectively.Meanwhile, under run-6 with normal class, BiGODL-CDC technique achievedPren,Recl, andF1measurevalues being 92.65%, 91.47%, and 91.06% correspondingly.Afterward, under run-6 with insult class, BiGODL-CDC system attainedPren,Recl, andF1measurevalues such as 90.42%,90.22%, and 90.04% respectively.
Table 1: Results of the analysis of BiGODL-CDC model under different runs
Concurrently, under run-7 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 92.17%, 91.48%, and 90.28% correspondingly.Besides, under run-7 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.75%, 90.26%,and 91.97% respectively.Simultaneously, under run-8 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.08%, 91.54%, and 90.99% respectively.At the same time, under run-8 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.65%, 92.29%, and 90.58% correspondingly.Furthermore, under run-9 with normal class,BiGODL-CDC technique obtainedPren,Recl,andF1measurevaluesnamely92.46%,92.95%,and92.56%correspondingly.Then, under run-9 with insult class, BiGODL-CDC technique attainedPren,Recl,andF1measurevalues namely 92.08%, 90.97%, and 92.67% respectively.Finally, under run-10 with normal class, BiGODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 91.5%, 92.07%, and 91.74% correspondingly.At last, under run-10 with insult class, BiGODL-CDC technique attainedPren,Recl, andF1measurevalues like 91.51%, 90.23%, and 91.45% respectively.
Tab.2 and Fig.3 provide the comprehensive classification results offered by BiGODL-CDC technique under ten distinct runs.The results show that the proposed BiGODL-CDC technique accomplished maximum cyberbullying detection performance.For instance, with run-1, BIGODLCDC technique achievedPren,Recl,F1measure, andaccyof 91.92%, 91.56%, 92.73%, and 91.64% correspondingly.In addition,with run-4,BiGODL-CDC method reachedPren,Recl,F1measure,andaccyof 90.07%, 91.42%, 91.50%, and 91.27% correspondingly.In line with these, with run-6, BIGODLCDC algorithm obtainedPren,Recl,F1measure, andaccyvalues such as 91.54%, 90.85%, 90.55%, and 90.90% respectively.Likewise, with run-8, BiGODL-CDC technique reachedPren,Recl,F1measure, andaccysuch as 91.37%, 91.92%, 90.79%, and 91.56% correspondingly.Lastly, with run-10, BiGODLCDC methodology achievedPren,Recl,F1measure, andaccyvalues such as 91.51%, 91.15%, 91.60%, and 91.48% correspondingly.
Table 2: Classification analysis results of BiGODL-CDC model under varying measures
Fig.4 illustrates the results for accuracy analysis of BiGODL-CDC technique.The figure implies that the accuracy values increased with an increase in epoch count.It is also noted that the validation accuracy also seemed to be higher than the training accuracy.
Loss graph analysis results accomplished by BiGODL-CDC technique is illustrated in Fig.5.The figure infers that the loss values are minimal with increasing epoch counts.It is also observed that the validation loss is considerably lower than the training loss.
Figure 3: Classification analysis results of BiGODL-CDC model under different measures
Figure 4: Accuracy analysis of BiGODL-CDC model
Tab.3 shows the classification outcomes obtained by the proposed ODL-CDC system on test Kaggle dataset.The outcomes show that the proposed ODL-CDC technique outperformed all other methods and accomplished an effectual performance under all classes.For instance, under run-1 with normal class, ODL-CDC technique attainedPren,Recl, andF1measurevalues such as 92.04%,91.23%, and 93.61% correspondingly.At the same time, under run-1 with insult class, ODL-CDC technique attainedPren,Recl, andF1measurevalues such as 93.59%, 93.05%, and 93.20% respectively.Simultaneously, under run-2 with normal class, ODL-CDC approach obtainedPren,Recl, andF1measurevalues such as 92.02%, 92.96%, and 92.33% correspondingly.Concurrently, under run-2 with insult class, ODL-CDC approach gainedPren,Recl, andF1measurevalues such as 91.95%, 92.91%, and 91.54%correspondingly.Afterwards, under run-3 with normal class, ODL-CDC method obtainedPren,Recl,andF1measurevalues such as 93.84%, 93.02%, and 92.48% respectively.At the same time, under run-3 with insult class, ODL-CDC technique reachedPren,Recl, andF1measurevalues such as 93.27%,91.74%, and 91.55% correspondingly.Along with that, under run-4 with normal class, ODL-CDC methodology obtainedPren,Recl,andF1measurevaluessuchas90.79%,93.36%,and92.30%respectively.Also, under run-4 with insult class, ODL-CDC system attainedPren,Recl, andF1measurevalues such as 90.63%, 90.99%, and 92.26% correspondingly.In addition, under run-5 with normal class, ODLCDC methodology achievedPren,Recl, andF1measurevalues such as 92.42%, 92.06%, and 91.89%respectively.Then, under run-5 with insult class,ODL-CDC technique attainedPren,Recl,andF1measurevalues such as 93.50%, 93.45%, and 91.47% respectively.In the meantime, under run-6 with normal class, ODL-CDC system gainedPren,Recl, andF1measurevalues such as 93.40%, 92.38%, and 91.80%correspondingly.Afterward, under run-6 with insult class, ODL-CDC algorithm attainedPren,Recl,andF1measurevalues such as 91.09%, 90.81%, and 90.55% respectively.
Figure 5: Loss analysis of BiGODL-CDC model
Table 3: Analysis results of ODL-CDC model with different runs
Also, under run-7 with normal class, ODL-CDC technique gainedPren,Recl, andF1measurevalues such as 92.72%, 92.14%, and 91.27% correspondingly.Then, under run-7 with insult class, ODL-CDC algorithm attainedPren,Recl, andF1measurevalues such as 93.32%, 91.03%, and 92.47% respectively.At the same time, under run-8 with normal class, ODL-CDC technique obtainedPren,Recl, andF1measurevalues such as 90.96%, 92.07%, and 91.59% correspondingly.Also, under run-8 with insult class,ODLCDC system attainedPren,Recl, andF1measurevalues such as 93.36%, 93.02%, and 91.31% respectively.Furthermore, under run-9 with normal class, ODL-CDC method obtainedPren,Recl, andF1measurevalues such as 93.44%, 93.77%, and 93.47% respectively.At the same time, under run-9 with insult class, ODL-CDC method achievedPren,Recl, andF1measurevalues such as 93.08%, 91.49%, and 93.55%correspondingly.At last, under run-10 with normal class,ODL-CDC methodology attainedPren,Recl,andF1measurevalues such as 93.44%, 93.77%, and 93.47% respectively.Besides, under run-10 with insult class,ODL-CDC technique reachedPren,Recl,andF1measurevaluessuchas93.08%,91.49%,and93.55%correspondingly.
Tab.4 and Fig.6 offer the results for comprehensive classification obtained by the proposed ODL-CDC manner under ten distinct runs.The outcomes showcase that the proposed ODL-CDC technique accomplished the maximal cyberbullying detection performance.For instance, with run-1,ODL-CDC approach gainedPren,Recl,F1measure, andaccyvalues such as 92.82%, 92.14%, 93.41%, and 92.39% correspondingly.Followed by, with run-4, ODL-CDC system achievedPren,Recl,F1measure,andaccyvalues such as 90.71%, 92.18%, 92.28%, and 92.16% respectively.Likewise, with run-6, ODLCDC methodology obtainedPren,Recl,F1measure, andaccyvalues such as 92.25%, 91.60%, 91.18%,and 91.67% correspondingly.At the same time, with run-8, ODL-CDC technique achievedPren,Recl,F1measure, andaccyvalues such as 92.16%, 92.55%, 91.45%, and 92.44% respectively.Eventually, with run-10, ODL-CDC method reachedPren,Recl,F1measure, andaccyvalues such as 93.26%, 92.63%,93.51%, and 92.93% correspondingly.
Table 4: Classification analysis results of ODL-CDC model with varying measures
Figure 6: Classification analysis results of ODL-CDC model with different measures
The results for accuracy graph analysis obtained by ODL-CDC approach is demonstrated in Fig.7.The figure infers that the accuracy values increased with increasing number of epoch counts.It can be also stated that the validation accuracy is superior to training accuracy.
Figure 7: Accuracy analysis results of ODL-CDC model
Fig.8 shows the results for loss graph analysis obtained by ODL-CDC manner.The figure infers that the loss values got established to a low, with an increase in epoch count.It is also clear that the validation loss is considerably lesser than the training loss.
Figure 8: Loss analysis results of ODL-CDC model
Finally, a brief comparative accuracy analysis was conducted between ODL-CDC and recent approaches and the results are shown in Tab.5 and Fig.9.The results portray that BLSTM, GRU,LSTM, and RNN techniques obtained the least accuracy values such as 82.18%, 81.46%, 80.86%, and 81.01%.Followed by, BiGRNN technique accomplished a moderately reasonable accuracy of 91.66%.However, the proposed ODL-CDC technique resulted in maximum accuracy of 92.45%.These results validate the supremacy of the proposed ODL-CDC technique in tersm of detection and classification of cyberbullying.
Figure 9: Testing accuracy analysis results of ODL-CDC model
4 Conclusion
In this study, a novel ODL-CDC technique is developed to identify the presence of cyberbullying in social networking data.The proposed ODL-CDC technique comprises of pre-processing, Glovebased word embedding, BiGRNN-based prediction, and SRO-based hyperparameter optimization processes.The utilization of SRO algorithm for proper hyperparameter tuning of BiGRNN parameters helps in boost the classification performance substantially.In order to ensure an improved classification performance of ODL-CDC technique, a comprehensive experimental analysis was carried out on benchmark dataset.The resultswere inspected under varying aspectswhile the proposed model achieved a maximum accuracy of 92.45%.A detailed comparative study portrayed the better performance of ODL-CDC technique over recent techniques under different measures.In future,hybrid metaheuristics and outlier detection concepts can be integrated with ODL-CDC technique to increase the detection performance.
Acknowledgement:The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) of this publication.
Funding Statement:The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number (GPR/303/42).Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2022R191),Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.
杂志排行
Computers Materials&Continua的其它文章
- Constructing Collective Signature Schemes Using Problem of Finding Roots Modulo
- Modeling and Simulation of Two Axes Gimbal Using Fuzzy Control
- Artificial Monitoring of Eccentric Synchronous Reluctance Motors Using Neural Networks
- An Optimal Scheme for WSN Based on Compressed Sensing
- Triple-Band Metamaterial Inspired Antenna for Future Terahertz (THz)Applications
- Adaptive Multi-Cost Routing Protocol to Enhance Lifetime for Wireless Body Area Network