Improvement of data analysis and protection using novel privacy-preserving methods for big data application
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.2.30Keywords:
Apache Spark, Big Data, ChiSqSelector, Intrusion detection, Support vector machine (SVM)Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Due to the increasing volume of data, the importance of data analysis systems has become more critical. An intrusion detection system is a type of software that monitors and analyzes the data collected by a network or system. Due to the increasing volume of data collected in the medical field, it has become harder for traditional methods to detect unauthorized access and manipulation of the data. To advance the efficiency of big data analysis, various techniques are used in IDS. This paper proposes a method that combines the deep learning network and proposed optimization algorithm. The goal of this paper is to develop a classification model that takes into account the hidden layer nodes of the DBN and then implement a PSO algorithm to improve its structure. The results of the simulations show that the Spark-DBN-PSO algorithm achieves a 99.04% accuracy rate, which is higher than the accuracy of other deep neural network (DNN) and artificial neural network (ANN) algorithms. The results of the research demonstrate that the proposed methodology performs superior than the existing algorithm.Abstract
How to Cite
Downloads
Similar Articles
- O. Devipriya, K. Kungumaraj, Enhancing cloud efficiency: an intelligent virtual machine selection and migration approach for VM consolidation , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- J. Helan Shali Margret, N. Amsaveni, A study on recency patterns of cited resources in the cytokine publications from web of science , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Temesgen Asfaw, Customer churn prediction using machine-learning techniques in the case of commercial bank of Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Prabu Gopal, M. Jeyaseelan, Familial support of rural elderly in indian family system: A sociological analysis , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Raja S, Nagarajan L., Hybridization of bio-inspired algorithms with machine learning models for predicting the risk of type 2 diabetes mellitus , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, Feature selection in HR analytics: A hybrid optimization approach with PSO and GSO , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Temesgen A. Asfaw, Batch size impact on enset leaf disease detection , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
<< < 3 4 5 6 7 8 9 10 11 12 > >>
You may also start an advanced similarity search for this article.