PeerJ Computer SciencePub Date : 2024-11-27eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2505
Shalini Dhananjay Balgude, Shilpa Gite, Biswajeet Pradhan, Chang-Wook Lee
{"title":"Artificial intelligence and machine learning approaches in cerebral palsy diagnosis, prognosis, and management: a comprehensive review.","authors":"Shalini Dhananjay Balgude, Shilpa Gite, Biswajeet Pradhan, Chang-Wook Lee","doi":"10.7717/peerj-cs.2505","DOIUrl":"10.7717/peerj-cs.2505","url":null,"abstract":"<p><p>Cerebral palsy (CP) is a group of disorders that alters patients' muscle coordination, posture, and movement, resulting in a wide range of deformities. Cerebral palsy can be caused by various factors, both prenatal and postnatal, such as infections or injuries that damage different parts of the brain. As brain plasticity is more prevalent during childhood, early detection can help take the necessary course of management and treatments that would significantly benefit patients by improving their quality of life. Currently, cerebral palsy patients receive regular physiotherapies, occupational therapies, speech therapies, and medications to deal with secondary abnormalities arising due to CP. Advancements in artificial intelligence (AI) and machine learning (ML) over the years have demonstrated the potential to improve the diagnosis, prognosis, and management of CP. This review article synthesizes existing research on AI and ML techniques applied to CP. It provides a comprehensive overview of the role of AI-ML in cerebral palsy, focusing on its applications, benefits, challenges, and future prospects. Through an extensive examination of existing literature, we explore various AI-ML approaches, including but not limited to assessment, diagnosis, treatment planning, and outcome prediction for cerebral palsy. Additionally, we address the ethical considerations, technical limitations, and barriers to the widespread adoption of AI-ML for CP patient care. By synthesizing current knowledge and identifying gaps in research, this review aims to guide future endeavors in harnessing AI-ML for optimizing outcomes and transforming care delivery in cerebral palsy rehabilitation.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2505"},"PeriodicalIF":3.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11622882/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-27eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2405
Bei Gong, Ida Puteri Mahsan, Junhua Xiao
{"title":"Federated learning-driven collaborative recommendation system for multi-modal art analysis and enhanced recommendations.","authors":"Bei Gong, Ida Puteri Mahsan, Junhua Xiao","doi":"10.7717/peerj-cs.2405","DOIUrl":"10.7717/peerj-cs.2405","url":null,"abstract":"<p><p>With the rapid development of artificial intelligence technology, recommendation systems have been widely applied in various fields. However, in the art field, art similarity search and recommendation systems face unique challenges, namely data privacy and copyright protection issues. To address these problems, this article proposes a cross-institutional artwork similarity search and recommendation system (AI-based Collaborative Recommendation System (AICRS) framework) that combines multimodal data fusion and federated learning. This system uses pre-trained convolutional neural networks (CNN) and Bidirectional Encoder Representation from Transformers (BERT) models to extract features from image and text data. It then uses a federated learning framework to train models locally at each participating institution and aggregate parameters to optimize the global model. Experimental results show that the AICRS framework achieves a final accuracy of 92.02% on the SemArt dataset, compared to 81.52% and 83.44% for traditional CNN and Long Short-Term Memory (LSTM) models, respectively. The final loss value of the AICRS framework is 0.1284, which is better than the 0.248 and 0.188 of CNN and LSTM models. The research results of this article not only provide an effective technical solution but also offer strong support for the recommendation and protection of artworks in practice.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2405"},"PeriodicalIF":3.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623116/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing brain tumor MRI classification with an ensemble of deep learning models and transformer integration.","authors":"Nawal Benzorgat, Kewen Xia, Mustapha Noure Eddine Benzorgat","doi":"10.7717/peerj-cs.2425","DOIUrl":"10.7717/peerj-cs.2425","url":null,"abstract":"<p><p>Brain tumors are widely recognized as the primary cause of cancer-related mortality globally, necessitating precise detection to enhance patient survival rates. The early identification of brain tumor is presented with significant challenges in the healthcare domain, necessitating the implementation of precise and efficient diagnostic methodologies. The manual identification and analysis of extensive MRI data are presented as a challenging and laborious task, compounded by the importance of early tumor detection in reducing mortality rates. Prompt initiation of treatment hinges upon identifying the specific tumor type in patients, emphasizing the urgency for a dependable deep learning methodology for precise diagnosis. In this research, a hybrid model is presented which integrates the strengths of both transfer learning and the transformer encoder mechanism. After the performance evaluation of the efficacy of six pre-existing deep learning model, both individually and in combination, it was determined that an ensemble of three pretrained models achieved the highest accuracy. This ensemble, comprising DenseNet201, GoogleNet (InceptionV3), and InceptionResNetV2, is selected as the feature extraction framework for the transformer encoder network. The transformer encoder module integrates a Shifted Window-based Self-Attention mechanism, sequential Self-Attention, with a multilayer perceptron layer (MLP). These experiments were conducted on three publicly available research datasets for evaluation purposes. The Cheng dataset, BT-large-2c, and BT-large-4c dataset, each designed for various classification tasks with differences in sample number, planes, and contrast. The model gives consistent results on all three datasets and reaches an accuracy of 99.34%, 99.16%, and 98.62%, respectively, which are improved compared to other techniques.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2425"},"PeriodicalIF":3.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623201/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2489
Sabrina Benbatata, Bilal Saoud, Ibraheem Shayea, Naif Alsharabi, Abdulraqeb Alhammadi, Ali Alferaidi, Amr Jadi, Yousef Ibrahim Daradkeh
{"title":"A novel deep neural network-based technique for network embedding.","authors":"Sabrina Benbatata, Bilal Saoud, Ibraheem Shayea, Naif Alsharabi, Abdulraqeb Alhammadi, Ali Alferaidi, Amr Jadi, Yousef Ibrahim Daradkeh","doi":"10.7717/peerj-cs.2489","DOIUrl":"10.7717/peerj-cs.2489","url":null,"abstract":"<p><p>In this paper, the graph segmentation (GSeg) method has been proposed. This solution is a novel graph neural network framework for network embedding that leverages the inherent characteristics of nodes and the underlying local network topology. The key innovation of GSeg lies in its encoder-decoder architecture, which is specifically designed to preserve the network's structural properties. The key contributions of GSeg are: (1) a novel graph neural network architecture that effectively captures local and global network structures, and (2) a robust node representation learning approach that achieves superior performance in various network analysis tasks. The methodology employed in our study involves the utilization of a graph neural network framework for the acquisition of node representations. The design leverages the inherent characteristics of nodes and the underlying local network topology. To enhance the architectural framework of encoder- decoder networks, the GSeg model is specifically devised to exhibit a structural resemblance to the SegNet model. The obtained empirical results on multiple benchmark datasets demonstrate that the GSeg outperforms existing state-of-the-art methods in terms of network structure preservation and prediction accuracy for downstream tasks. The proposed technique has potential utility across a range of practical applications in the real world.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2489"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623240/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2560
Shaohan Wei
{"title":"Multi-angle information aggregation for inductive temporal graph embedding.","authors":"Shaohan Wei","doi":"10.7717/peerj-cs.2560","DOIUrl":"10.7717/peerj-cs.2560","url":null,"abstract":"<p><p>Graph embedding has gained significant popularity due to its ability to represent large-scale graph data by mapping nodes to a low-dimensional space. However, most of the existing research in this field has focused on transductive learning, where fixed node embeddings are generated by training the entire graph. This approach is not well-suited for temporal graphs that undergo continuous changes with the addition of new nodes and interactions. To address this limitation, we propose an inductive temporal graph embedding method called MIAN (Multi-angle Information Aggregation Network). The key focus of MIAN is to design an aggregation function that combines multi-angle information for generating node embeddings. Specifically, we divide the information into different angles, including neighborhood, temporal, and environment. Each angle of information is modeled and mined independently, and then fed into an improved gated recuttent unit (GRU) module to effectively combine them. To assess the performance of MIAN, we conduct extensive experiments on various real-world datasets and compare its results with several state-of-the-art baseline methods across diverse tasks. The experimental findings demonstrate that MIAN outperforms these methods.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2560"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623124/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2500
Ahmed Abdelreheem Khalil, Mohamed Abdelaziz Mandour, Ahmed Ali
{"title":"The benefits of social insurance system prediction using a hybrid fuzzy time series method.","authors":"Ahmed Abdelreheem Khalil, Mohamed Abdelaziz Mandour, Ahmed Ali","doi":"10.7717/peerj-cs.2500","DOIUrl":"10.7717/peerj-cs.2500","url":null,"abstract":"<p><p>Decision-making in many industries relies heavily on accurate forecasts, including the insurance sector. The Social Insurance System (SIS) in Egypt, operating under a fully funded paradigm, depends on reliable predictions to ensure effective financial planning. This research introduces a hybrid predictive model that combines fuzzy time series (FTS) Markov chains with the tree partition method (TPM) and difference transformation to forecast total pension benefits within Egypt's SIS. A key feature of the proposed model is its ability to optimize the partitioning process, resulting in the creation of nine intervals that reduce computational complexity while maintaining forecasting accuracy. These intervals were consistently applied across all fuzzy time series models for comparison. The model's performance is evaluated using established metrics such as MAPE, Thiels' U statistic, and RMSE. Additionally, prediction interval coverage probability (PICP) and mean prediction interval length (MPIL) are used to assess the quality of prediction intervals, with a 95% prediction interval serving as the baseline. The proposed model achieved a PICP of approximately 95%, indicating well-calibrated prediction intervals, although the MPIL of 424.5 reflects a wider uncertainty range. Despite this, the model balances coverage accuracy and interval precision effectively. The results demonstrate that the proposed model significantly outperforms traditional models like linear regression, ARIMA, and exponential smoothing and conventional FTS models like Song, Chen, Yu, and Cheng by achieving the lowest MAPE with the value of 11.8% for training and 10.65% for testing. This superior performance highlights the model's reliability and potential applicability to further forecasting tasks in the field of insurance and beyond.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2500"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11639234/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142830867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2472
Afaq Ahmed, Muhammad Asim, Irshad Ullah, Zainulabidin, Abdelhamied A Ateya
{"title":"An optimized ensemble model with advanced feature selection for network intrusion detection.","authors":"Afaq Ahmed, Muhammad Asim, Irshad Ullah, Zainulabidin, Abdelhamied A Ateya","doi":"10.7717/peerj-cs.2472","DOIUrl":"10.7717/peerj-cs.2472","url":null,"abstract":"<p><p>In today's digital era, advancements in technology have led to unparalleled levels of connectivity, but have also brought forth a new wave of cyber threats. Network Intrusion Detection Systems (NIDS) are crucial for ensuring the security and integrity of networked systems by identifying and mitigating unauthorized access and malicious activities. Traditional machine learning techniques have been extensively employed for this purpose due to their high accuracy and low false alarm rates. However, these methods often fall short in detecting sophisticated and evolving threats, particularly those involving subtle variations or mutations of known attack patterns. To address this challenge, our study presents the \"Optimized Random Forest (Opt-Forest),\" an innovative ensemble model that combines decision forest approaches with genetic algorithms (GAs) for enhanced intrusion detection. The genetic algorithms based decision forest construction offers notable benefits by traversing a wider exploration space and mitigating the risk of becoming stuck in local optima, resulting in the discovery of more accurate and compact decision trees. Leveraging advanced feature selection techniques, including Best-First Search, Particle Swarm Optimization (PSO), Evolutionary Search, and Genetic Search (GS), along with contemporary dataset, this research aims to enhance the adaptability and resilience of NIDS against modern cyber threats. We conducted a comprehensive evaluation of the proposed approach against several well-known machine learning models, including AdaBoostM1 (AbM1), K-nearest neighbor (KNN), J48-Decision Tree (J48), multilayer perceptron (MLP), stochastic gradient descent (SGD), naïve Bayes (NB), and logistic model tree (LMT). The comparative analysis demonstrates the effectiveness and superiority of our method across various performance metrics, highlighting its potential to significantly enhance the capabilities of network intrusion detection systems.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2472"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623070/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2532
Peifeng Wu, Yaqiang Chen
{"title":"Enhanced detection of accounting fraud using a CNN-LSTM-Attention model optimized by Sparrow search.","authors":"Peifeng Wu, Yaqiang Chen","doi":"10.7717/peerj-cs.2532","DOIUrl":"10.7717/peerj-cs.2532","url":null,"abstract":"<p><p>The detection of corporate accounting fraud is a critical challenge in the financial industry, where traditional models such as neural networks, logistic regression, and support vector machines often fall short in achieving high accuracy due to the complex and evolving nature of fraudulent activities. This paper proposes an enhanced approach to fraud detection by integrating convolutional neural networks (CNN) and long short-term memory (LSTM) networks, complemented by an attention mechanism to prioritize relevant features. To further improve the model's performance, the sparrow search algorithm (SSA) is employed for parameter optimization, ensuring the best configuration of the CNN-LSTM-Attention framework. Experimental results demonstrate that the proposed model outperforms conventional methods across various evaluation metrics, offering superior accuracy and robustness in recognizing fraudulent patterns in corporate accounting data.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2532"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623018/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2492
Ailing Zhang
{"title":"Application of big data and artificial intelligence in visual communication art design.","authors":"Ailing Zhang","doi":"10.7717/peerj-cs.2492","DOIUrl":"10.7717/peerj-cs.2492","url":null,"abstract":"<p><p>In the era of continuous development of computer technology, the application of artificial intelligence (AI) and big data is becoming more and more extensive. With the help of powerful computer and network technology, the art of visual communication (VISCOM) has ushered in a new chapter of digitalization and intelligence. How vision can better perform interdisciplinary and interdisciplinary artistic expression between art and technology and how to use more novel technology, richer forms, and more appropriate ways to express art has become a new problem in visual art creation. This essay aims to investigate and apply VISCOM art through big data and AI methods. This essay proposed the STING algorithm for big data for multi-resolution information clustering in VISCOM art. In addition, the convolutional neural network (CNN) in AI technology was used to identify the conveyed objects or scenes to achieve the purpose of designing art with different characteristics for different scenes and groups of people. STING is a multi-resolution clustering technique for big data, with the advantage of efficient data processing. In the experimental part, this essay selected a variety of design contents in VISCOM art, including logo design, text design, scene design, packaging design and poster design. STING and CNN algorithms were used to cluster and AI-identify the design elements 16 of the design projects might contain. The results showed that the overall average clustering accuracy was above 82%, the accuracy of scene element recognition mainly was above 80%, and the accuracy of facial recognition was above 80%; this showed that this essay applied AI and big data to the design of VISCOM, and had a good effect on the clustering and identification of design elements. According to expert scores, these applications' reliability and practicality scores were above 70 points, with an average of about 80 points. Therefore, applying big data and AI to VISCOM in this essay is reliable and feasible.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2492"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11622863/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142803294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
PeerJ Computer SciencePub Date : 2024-11-26eCollection Date: 2024-01-01DOI: 10.7717/peerj-cs.2464
Sarah A Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed
{"title":"A big data analysis algorithm for massive sensor medical images.","authors":"Sarah A Alzakari, Nuha Alruwais, Shaymaa Sorour, Shouki A Ebad, Asma Abbas Hassan Elnour, Ahmed Sayed","doi":"10.7717/peerj-cs.2464","DOIUrl":"10.7717/peerj-cs.2464","url":null,"abstract":"<p><p>Big data analytics for clinical decision-making has been proposed for various clinical sectors because clinical decisions are more evidence-based and promising. Healthcare data is so vast and readily available that big data analytics has completely transformed this sector and opened up many new prospects. The smart sensor-based big data analysis recommendation system has significant privacy and security concerns when using sensor medical images for suggestions and monitoring. The danger of security breaches and unauthorized access, which might lead to identity theft and privacy violations, increases when sending and storing sensitive medical data on the cloud. Our effort will improve patient care and well-being by creating an anomaly detection system based on machine learning specifically for medical images and providing timely treatments and notifications. Current anomaly detection methods in healthcare systems, such as artificial intelligence and big data analytics-intracerebral hemorrhage (AIBDA-ICH) and parallel conformer neural network (PCNN), face several challenges, including high resource consumption, inefficient feature selection, and an inability to handle temporal data effectively for real-time monitoring. Techniques like support vector machines (SVM) and the hidden Markov model (HMM) struggle with computational overhead and scalability in large datasets, limiting their performance in critical healthcare applications. Additionally, existing methods often fail to provide accurate anomaly detection with low latency, making them unsuitable for time-sensitive environments. We infer the extraction, feature selection, attack detection, and data collection and processing procedures to anticipate anomaly inpatient data. We transfer the data, take care of missing values, and sanitize it using the pre-processing mechanism. We employed the recursive feature elimination (RFE) and dynamic principal component analysis (DPCA) algorithms for feature selection and extraction. In addition, we applied the Auto-encoded genetic recurrent neural network (AGRNN) approach to identify abnormalities. Data arrival rate, resource consumption, propagation delay, transaction epoch, true positive rate, false alarm rate, and root mean square error (RMSE) are some metrics used to evaluate the proposed task.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"10 ","pages":"e2464"},"PeriodicalIF":3.5,"publicationDate":"2024-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623192/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142802927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}