Improvement of data analysis and protection using novel privacy-preserving methods for big data application
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.2.30Keywords:
Apache Spark, Big Data, ChiSqSelector, Intrusion detection, Support vector machine (SVM)Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Due to the increasing volume of data, the importance of data analysis systems has become more critical. An intrusion detection system is a type of software that monitors and analyzes the data collected by a network or system. Due to the increasing volume of data collected in the medical field, it has become harder for traditional methods to detect unauthorized access and manipulation of the data. To advance the efficiency of big data analysis, various techniques are used in IDS. This paper proposes a method that combines the deep learning network and proposed optimization algorithm. The goal of this paper is to develop a classification model that takes into account the hidden layer nodes of the DBN and then implement a PSO algorithm to improve its structure. The results of the simulations show that the Spark-DBN-PSO algorithm achieves a 99.04% accuracy rate, which is higher than the accuracy of other deep neural network (DNN) and artificial neural network (ANN) algorithms. The results of the research demonstrate that the proposed methodology performs superior than the existing algorithm.Abstract
How to Cite
Downloads
Similar Articles
- Archana G, Vijayalakshmi V, Improving classification precision for medical decision systems through big data analytics application , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V Anitha, Seema Sharma, R. Jayavadivel, Akundi Sai Hanuman, B Gayathri, R. Rajagopal, A network for collaborative detection of intrusions in smart cities using blockchain technology , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sahaya Jenitha A, Sinthu J. Prakash, A general stochastic model to handle deduplication challenges using hidden Markov model in big data analytics , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Balaji V, Purnendu Bikash Acharjee, Muniyandy Elangovan, Gauri Kalnoor, Ravi Rastogi, Vishnu Patidar, Developing a semantic framework for categorizing IoT agriculture sensor data: A machine learning and web semantics approach , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Raja Selvaraj, Manikandasaran S Sundaram, ECM: Enhanced confidentiality method to ensure the secure migration of data in VM to cloud environment , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sabeerath K, Manikandasaran S. Sundaram, BTEDD: Block-level tokens for efficient data deduplication in public cloud infrastructures , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- G. Deena, K. Raja, M. Azhagiri, W.A. Breen, S. Prema, Application of support vector classifier for mango leaf disease classification , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- N. Saranya, M. Kalpana Devi, A. Mythili, Summia P. H, Data science and machine learning methods for detecting credit card fraud , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.