Improvement of data analysis and protection using novel privacy-preserving methods for big data application
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.2.30Keywords:
Apache Spark, Big Data, ChiSqSelector, Intrusion detection, Support vector machine (SVM)Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Due to the increasing volume of data, the importance of data analysis systems has become more critical. An intrusion detection system is a type of software that monitors and analyzes the data collected by a network or system. Due to the increasing volume of data collected in the medical field, it has become harder for traditional methods to detect unauthorized access and manipulation of the data. To advance the efficiency of big data analysis, various techniques are used in IDS. This paper proposes a method that combines the deep learning network and proposed optimization algorithm. The goal of this paper is to develop a classification model that takes into account the hidden layer nodes of the DBN and then implement a PSO algorithm to improve its structure. The results of the simulations show that the Spark-DBN-PSO algorithm achieves a 99.04% accuracy rate, which is higher than the accuracy of other deep neural network (DNN) and artificial neural network (ANN) algorithms. The results of the research demonstrate that the proposed methodology performs superior than the existing algorithm.Abstract
How to Cite
Downloads
Similar Articles
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing security of cloud using static IP techniques , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- N. Ruba, A. S. A. Khadir, Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Lakshmi Priya, Anil Vasoya, C. Boopathi, Muthukumar Marappan, Evaluating dynamics, security, and performance metrics for smart manufacturing , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Habtamu Rufe Gurmu, M. Krishna Naidu, Garedo Tesfa, Assessment of Factors Influencing Use of Insecticide among Smallholders Farmers in Dale Sadi District of Kellem Wallega Zone, Ethiopia , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Priydarshi Shireesh, Tiwari Atul Kumar, Singh Prashant, Rai Kumud, Mishra Dev Brat, Comparative Water Quality Analysis in Beso River in District Jaunpur, Azamgarh and Ghazipur Uttar Pradesh , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- R. Gomathi, Balaji V, Sanjay R. Pawar, Ayesha Siddiqua, M. Dhanalakshmi, Ravi Rastogi, Ensuring ethical integrity and bias reduction in machine learning models , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Avdhesh Kumar, Manoj Agarwal, Studies on challenges and opportunities for foreign direct investment in the automobile industry in India , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Amanda Q. Okronipa, Jones Y. Nyame, Adoption of health information systems in emerging economies: Evidence from Ghana , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Surendra Singh Bisht, Saurabh Charaya, Rachna Mehta, A Comparative and Hybrid Machine Learning Framework for IoT-Based Predictive Maintenance of Rotating Machinery , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.

