2021
DOI: 10.1007/s42979-021-00592-x
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning: Algorithms, Real-World Applications and Research Directions

Abstract: In the current age of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data, business data, social media data, health data, etc. To intelligently analyze these data and develop the corresponding smart and automated applications, the knowledge of artificial intelligence (AI), particularly, machine learning (ML) is the key. Various types of machine learning algorithms such as supervised, unsupervised,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
860
0
28

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 1,776 publications
(889 citation statements)
references
References 120 publications
1
860
0
28
Order By: Relevance
“…(2) Sensor Network and Embedded Technology. Wireless sensor network can be considered to be composed of three parts: data acquisition network, data distribution network, and control management center [25][26][27][28]. The main components are sensors, data processing unit, and communication module integrated node.…”
Section: Overview Of the Internet Of Things And Related Technologiesmentioning
confidence: 99%
“…(2) Sensor Network and Embedded Technology. Wireless sensor network can be considered to be composed of three parts: data acquisition network, data distribution network, and control management center [25][26][27][28]. The main components are sensors, data processing unit, and communication module integrated node.…”
Section: Overview Of the Internet Of Things And Related Technologiesmentioning
confidence: 99%
“…These models learn the discriminating features of benign traffic and malicious traffic using different architectures such as Random Forest (RF) [ 18 ], Support Vector Machine (SVM) [ 19 ], Deep Neural Network (DNN) [ 20 ], Recurrent Neural Network (RNN) [ 21 ], Long Short-Term Memory (LSTM) [ 22 ] and Gated Recurrent Unit (GRU) [ 23 ]. For an in-depth understanding, comprehensive reviews and surveys on the application of ML and DL in intrusion detection are presented in [ 24 , 25 , 26 , 27 , 28 , 29 ].…”
Section: Introductionmentioning
confidence: 99%
“…the topics from the abstracts of research papers. After that, we employed kmeans clustering algorithm [7] to cluster the similar topics. A greedy algorithm ATAC has been introduced to find the attribute driven temporal local active community with respect the given query Q, containing the query node u q over k-core connected subgraph, within h hops.…”
Section: Discussionmentioning
confidence: 99%
“…The proposed framework includes three stages layout as presented in Figure 2 to search attribute driven temporal active community (ATAC). First, the pre-processing is performed to eliminate irrelevant data or noises from the activity stream S. Second, topic modeling method has been applied, in our case, we applied LDA/BERTopic (Topic Modelling Approach) to the filtered data to recognize the latent topics from S. Then similar topics are being clustered by employing k-means clustering algorithm [7]. Finally, an algorithm is developed and applied to the processed activity streams to detect the desired community.…”
Section: Active Online Local Community Detection Approachmentioning
confidence: 99%