CINXE.COM
Machine Learning-Based Intrusion Detection System: An Experimental Comparison | Journal of Computational and Cognitive Engineering
<!DOCTYPE html> <html lang="en" xml:lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <title> Machine Learning-Based Intrusion Detection System: An Experimental Comparison | Journal of Computational and Cognitive Engineering </title> <link rel="icon" href="https://ojs.bonviewpress.com/public/journals/4/favicon_en_US.png"> <meta name="generator" content="Open Journal Systems 3.4.0.7"> <meta name="gs_meta_revision" content="1.1"/> <meta name="citation_journal_title" content="Journal of Computational and Cognitive Engineering"/> <meta name="citation_journal_abbrev" content="JCCE"/> <meta name="citation_issn" content="2810-9503"/> <meta name="citation_author" content="Imran Hidayat"/> <meta name="citation_author_institution" content="School of Computing, Edinburgh Napier University, UK"/> <meta name="citation_author" content="Muhammad Zulfiqar Ali"/> <meta name="citation_author_institution" content="James Watt School of Engineering, University of Glasgow, UK"/> <meta name="citation_author" content="Arshad Arshad"/> <meta name="citation_author_institution" content="School of Computing, Glasgow Caledonian University, UK"/> <meta name="citation_title" content="Machine Learning-Based Intrusion Detection System: An Experimental Comparison"/> <meta name="citation_language" content="en"/> <meta name="citation_date" content="2023"/> <meta name="citation_volume" content="2"/> <meta name="citation_issue" content="2"/> <meta name="citation_firstpage" content="88"/> <meta name="citation_lastpage" content="97"/> <meta name="citation_doi" content="10.47852/bonviewJCCE2202270"/> <meta name="citation_abstract_html_url" content="https://ojs.bonviewpress.com/index.php/JCCE/article/view/270"/> <meta name="citation_abstract" xml:lang="en" content="Recently, networks are moving toward automation and getting more and more intelligent. With the advent of big data and cloud computing technologies, lots and lots of data are being produced on the internet. Every day, petabytes of data are produced from websites, social media sites, or the internet. As more and more data are produced, a continuous threat of network attacks is also growing. An intrusion detection system (IDS) is used to detect such types of attacks in the network. IDS inspects packet headers and data and decides whether the traffic is anomalous or normal based on the contents of the packet. In this research, ML techniques are being used for intrusion detection purposes. Feature selection is also used for efficient and optimal feature selection. The research proposes a hybrid feature selection technique composed of the Pearson correlation coefficient and random forest model. For the machine learning (ML) model, decision tree, AdaBoost, and K-nearest neighbor are trained and tested on the TON_IoT dataset. The dataset is new and contains new and recent attack types and features. For deep learning (DL), multilayer perceptron (MLP) and long short-term memory are trained and tested. Evaluation is done on the basis of accuracy, precision, and recall. It is concluded from the results that the decision tree for ML and MLP for DL provides optimal accuracy with fewer false-positive and false-negative rates. It is also concluded from the results that the ML techniques are effective for detecting intrusion in the networks. 聽 Received: 8 June 2022 | Revised: 6 July 2022 | Accepted: 11 July 2022 聽 Conflicts of Interest The authors declare that they have no conflicts of interest to this work."/> <meta name="citation_keywords" xml:lang="en" content="MLP"/> <meta name="citation_keywords" xml:lang="en" content="LSTM"/> <meta name="citation_keywords" xml:lang="en" content="KNN"/> <meta name="citation_keywords" xml:lang="en" content="IDS"/> <meta name="citation_keywords" xml:lang="en" content="machine learning"/> <meta name="citation_pdf_url" content="https://ojs.bonviewpress.com/index.php/JCCE/article/download/270/176"/> <link rel="schema.DC" href="http://purl.org/dc/elements/1.1/" /> <meta name="DC.Creator.PersonalName" content="Imran Hidayat"/> <meta name="DC.Creator.PersonalName" content="Muhammad Zulfiqar Ali"/> <meta name="DC.Creator.PersonalName" content="Arshad Arshad"/> <meta name="DC.Date.created" scheme="ISO8601" content="2022-07-13"/> <meta name="DC.Date.dateSubmitted" scheme="ISO8601" content="2022-06-08"/> <meta name="DC.Date.issued" scheme="ISO8601" content="2023-05-18"/> <meta name="DC.Date.modified" scheme="ISO8601" content="2024-01-10"/> <meta name="DC.Description" xml:lang="en" content="Recently, networks are moving toward automation and getting more and more intelligent. With the advent of big data and cloud computing technologies, lots and lots of data are being produced on the internet. Every day, petabytes of data are produced from websites, social media sites, or the internet. As more and more data are produced, a continuous threat of network attacks is also growing. An intrusion detection system (IDS) is used to detect such types of attacks in the network. IDS inspects packet headers and data and decides whether the traffic is anomalous or normal based on the contents of the packet. In this research, ML techniques are being used for intrusion detection purposes. Feature selection is also used for efficient and optimal feature selection. The research proposes a hybrid feature selection technique composed of the Pearson correlation coefficient and random forest model. For the machine learning (ML) model, decision tree, AdaBoost, and K-nearest neighbor are trained and tested on the TON_IoT dataset. The dataset is new and contains new and recent attack types and features. For deep learning (DL), multilayer perceptron (MLP) and long short-term memory are trained and tested. Evaluation is done on the basis of accuracy, precision, and recall. It is concluded from the results that the decision tree for ML and MLP for DL provides optimal accuracy with fewer false-positive and false-negative rates. It is also concluded from the results that the ML techniques are effective for detecting intrusion in the networks. 聽 Received: 8 June 2022 | Revised: 6 July 2022 | Accepted: 11 July 2022 聽 Conflicts of Interest The authors declare that they have no conflicts of interest to this work."/> <meta name="DC.Format" scheme="IMT" content="application/pdf"/> <meta name="DC.Identifier" content="270"/> <meta name="DC.Identifier.pageNumber" content="88-97"/> <meta name="DC.Identifier.DOI" content="10.47852/bonviewJCCE2202270"/> <meta name="DC.Identifier.URI" content="https://ojs.bonviewpress.com/index.php/JCCE/article/view/270"/> <meta name="DC.Language" scheme="ISO639-1" content="en"/> <meta name="DC.Rights" content="Copyright (c) 2022 Authors"/> <meta name="DC.Rights" content="https://creativecommons.org/licenses/by/4.0/"/> <meta name="DC.Source" content="Journal of Computational and Cognitive Engineering"/> <meta name="DC.Source.ISSN" content="2810-9503"/> <meta name="DC.Source.Issue" content="2"/> <meta name="DC.Source.Volume" content="2"/> <meta name="DC.Source.URI" content="https://ojs.bonviewpress.com/index.php/JCCE"/> <meta name="DC.Subject" xml:lang="en" content="MLP"/> <meta name="DC.Subject" xml:lang="en" content="LSTM"/> <meta name="DC.Subject" xml:lang="en" content="KNN"/> <meta name="DC.Subject" xml:lang="en" content="IDS"/> <meta name="DC.Subject" xml:lang="en" content="machine learning"/> <meta name="DC.Title" content="Machine Learning-Based Intrusion Detection System: An Experimental Comparison"/> <meta name="DC.Type" content="Text.Serial.Journal"/> <meta name="DC.Type.articleType" content="Research Articles"/> <link rel="stylesheet" href="https://ojs.bonviewpress.com/index.php/JCCE/$$$call$$$/page/page/css?name=stylesheet" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/index.php/JCCE/$$$call$$$/page/page/css?name=font" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/lib/pkp/styles/fontawesome/fontawesome.css?v=3.4.0.7" type="text/css" /><style type="text/css">.pkp_structure_head { background: center / cover no-repeat url("https://ojs.bonviewpress.com/public/journals/4/homepageImage_en_US.png");}</style><link rel="stylesheet" href="https://ojs.bonviewpress.com/plugins/generic/citations/css/citations.css?v=3.4.0.7" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/plugins/generic/orcidProfile/css/orcidProfile.css?v=3.4.0.7" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/plugins/generic/paperbuzz/paperbuzzviz/assets/css/paperbuzzviz.css?v=3.4.0.7" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/public/journals/4/styleSheet.css?d=2023-02-03+10%3A29%3A10" type="text/css" /><link rel="stylesheet" href="https://ojs.bonviewpress.com/plugins/generic/citationStyleLanguage/css/citationStyleLanguagePlugin.css?v=3.4.0.7" type="text/css" /> </head> <body class="pkp_page_article pkp_op_view" dir="ltr"> <div class="pkp_structure_page"> <header class="pkp_structure_head" id="headerNavigationContainer" role="banner"> <nav class="cmp_skip_to_content" aria-label="Jump to content links"> <a href="#pkp_content_main">Skip to main content</a> <a href="#siteNav">Skip to main navigation menu</a> <a href="#pkp_content_footer">Skip to site footer</a> </nav> <div class="pkp_head_wrapper"> <div class="pkp_site_name_wrapper"> <button class="pkp_site_nav_toggle"> <span>Open Menu</span> </button> <div class="pkp_site_name"> <a href=" https://ojs.bonviewpress.com/index.php/JCCE/index " class="is_text">Journal of Computational and Cognitive Engineering</a> </div> </div> <nav class="pkp_site_nav_menu" aria-label="Site Navigation"> <a id="siteNav"></a> <div class="pkp_navigation_primary_row"> <div class="pkp_navigation_primary_wrapper"> <ul id="navigationPrimary" class="pkp_navigation_primary pkp_nav_list"> <li class=""> <a href="http://ojs.bonviewpress.com/index.php/JCCE/index"> HOME </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/about"> ABOUT </a> <ul> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/aims_and_scope"> Aims and Scope </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/JM"> Journal Metrics </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/indexing"> Indexing & Abstracting </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/about/privacy"> Privacy Statement </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/contact"> Contact Us </a> </li> </ul> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/browse"> BROWSE </a> <ul> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/view/onlinefirst"> Online First </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/current"> Current Issue </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/archive"> All Issues </a> </li> </ul> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/contribute"> CONTRIBUTE </a> <ul> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/about/submissions"> Author Guidelines </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/OA"> Open Access </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/APC"> Article Processing Charge </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/peer_review_process"> Peer Review Process </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/pe"> Publishing Ethics </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/for_reviewers"> For Reviewers </a> </li> </ul> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/EBMembers"> EDITORIAL BOARD </a> </li> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/special_issues"> SPECIAL ISSUES </a> <ul> <li class=""> <a href="https://ojs.bonviewpress.com/index.php/JCCE/submittingproposal"> Submitting a Proposal </a> </li> </ul> </li> </ul> <div class="pkp_navigation_search_wrapper"> <a href="https://ojs.bonviewpress.com/index.php/index/search" class="pkp_search pkp_search_desktop"> <span class="fa fa-search" aria-hidden="true"></span> Search </a> </div> </div> </div> <div class="pkp_navigation_user_wrapper" id="navigationUserWrapper"> <ul id="navigationUser" class="pkp_navigation_user pkp_nav_list"> <li class="profile"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/user/register"> Register </a> </li> <li class="profile"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/browse"> BROWSE </a> </li> <li class="profile"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/login"> Login </a> </li> </ul> </div> </nav> </div><!-- .pkp_head_wrapper --> </header><!-- .pkp_structure_head --> <div class="pkp_structure_content has_sidebar"> <div class="pkp_structure_main" role="main"> <a id="pkp_content_main"></a> <div class="page page_article"> <nav class="cmp_breadcrumbs" role="navigation" aria-label="You are here:"> <ol> <li> <a href="https://ojs.bonviewpress.com/index.php/JCCE/index"> Home </a> <span class="separator">/</span> </li> <li> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/archive"> Archives </a> <span class="separator">/</span> </li> <li> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/view/47"> Vol. 2 No. 2 (2023) </a> <span class="separator">/</span> </li> <li class="current" aria-current="page"> <span aria-current="page"> Research Articles </span> </li> </ol> </nav> <article class="obj_article_details"> <h1 class="page_title"> Machine Learning-Based Intrusion Detection System: An Experimental Comparison </h1> <div class="row"> <div class="main_entry"> <section class="item authors"> <h2 class="pkp_screen_reader">Authors</h2> <ul class="authors"> <li> <span class="name"> Imran Hidayat </span> <span class="affiliation"> School of Computing, Edinburgh Napier University, UK </span> </li> <li> <span class="name"> Muhammad Zulfiqar Ali </span> <span class="affiliation"> James Watt School of Engineering, University of Glasgow, UK </span> </li> <li> <span class="name"> Arshad Arshad </span> <span class="affiliation"> School of Computing, Glasgow Caledonian University, UK </span> </li> </ul> </section> <section class="item doi"> <h2 class="label"> DOI: </h2> <span class="value"> <a href="https://doi.org/10.47852/bonviewJCCE2202270"> https://doi.org/10.47852/bonviewJCCE2202270 </a> </span> </section> <section class="item keywords"> <h2 class="label"> Keywords: </h2> <span class="value"> MLP, LSTM, KNN, IDS, machine learning </span> </section> <section class="item abstract"> <h2 class="label">Abstract</h2> <p>Recently, networks are moving toward automation and getting more and more intelligent. With the advent of big data and cloud computing technologies, lots and lots of data are being produced on the internet. Every day, petabytes of data are produced from websites, social media sites, or the internet. As more and more data are produced, a continuous threat of network attacks is also growing. An intrusion detection system (IDS) is used to detect such types of attacks in the network. IDS inspects packet headers and data and decides whether the traffic is anomalous or normal based on the contents of the packet. In this research, ML techniques are being used for intrusion detection purposes. Feature selection is also used for efficient and optimal feature selection. The research proposes a hybrid feature selection technique composed of the Pearson correlation coefficient and random forest model. For the machine learning (ML) model, decision tree, AdaBoost, and K-nearest neighbor are trained and tested on the TON_IoT dataset. The dataset is new and contains new and recent attack types and features. For deep learning (DL), multilayer perceptron (MLP) and long short-term memory are trained and tested. Evaluation is done on the basis of accuracy, precision, and recall. It is concluded from the results that the decision tree for ML and MLP for DL provides optimal accuracy with fewer false-positive and false-negative rates. It is also concluded from the results that the ML techniques are effective for detecting intrusion in the networks.</p> <p>聽</p> <p><strong>Received</strong>: 8 June 2022 | <strong>Revised</strong>: 6 July 2022 | <strong>Accepted</strong>: 11 July 2022</p> <p>聽</p> <p><strong>Conflicts of Interest</strong></p> <p>The authors declare that they have no conflicts of interest to this work.</p> </section> <br /><div class="separator"></div><div class="item abstract" id="trendmd-suggestions"></div><script defer src='//js.trendmd.com/trendmd.min.js' data-trendmdconfig='{"website_id":"89267", "element":"#trendmd-suggestions"}'></script><div class="item downloads_chart"> <h3 class="label"> Metrics </h3> <div id="paperbuzz"><div id="loading">Metrics Loading ...</div></div> <script type="text/javascript"> window.onload = function () { var options = { paperbuzzStatsJson: JSON.parse('{\"altmetrics_sources\":[{\"events\":null,\"events_count\":1624,\"events_count_by_day\":[{\"count\":\"1\",\"date\":\"2022-07-13\"},{\"count\":\"2\",\"date\":\"2022-07-19\"},{\"count\":\"1\",\"date\":\"2022-07-22\"},{\"count\":\"1\",\"date\":\"2022-08-10\"}],\"events_count_by_month\":[{\"count\":\"4\",\"date\":\"2022-07\"},{\"count\":\"6\",\"date\":\"2022-08\"},{\"count\":\"6\",\"date\":\"2022-09\"},{\"count\":\"3\",\"date\":\"2022-10\"},{\"count\":\"12\",\"date\":\"2022-11\"},{\"count\":\"21\",\"date\":\"2022-12\"},{\"count\":\"18\",\"date\":\"2023-01\"},{\"count\":\"28\",\"date\":\"2023-02\"},{\"count\":\"32\",\"date\":\"2023-03\"},{\"count\":\"46\",\"date\":\"2023-04\"},{\"count\":\"59\",\"date\":\"2023-05\"},{\"count\":\"60\",\"date\":\"2023-06\"},{\"count\":\"79\",\"date\":\"2023-07\"},{\"count\":\"47\",\"date\":\"2023-08\"},{\"count\":\"64\",\"date\":\"2023-09\"},{\"count\":\"45\",\"date\":\"2023-10\"},{\"count\":\"72\",\"date\":\"2023-11\"},{\"count\":\"65\",\"date\":\"2023-12\"},{\"count\":\"90\",\"date\":\"2024-01\"},{\"count\":\"101\",\"date\":\"2024-02\"},{\"count\":\"99\",\"date\":\"2024-03\"},{\"count\":\"113\",\"date\":\"2024-04\"},{\"count\":\"114\",\"date\":\"2024-05\"},{\"count\":\"60\",\"date\":\"2024-06\"},{\"count\":\"71\",\"date\":\"2024-07\"},{\"count\":\"93\",\"date\":\"2024-08\"},{\"count\":\"69\",\"date\":\"2024-09\"},{\"count\":\"81\",\"date\":\"2024-10\"},{\"count\":\"66\",\"date\":\"2024-11\"}],\"events_count_by_year\":[{\"count\":\"52\",\"date\":\"2022\"},{\"count\":\"615\",\"date\":\"2023\"},{\"count\":\"957\",\"date\":\"2024\"}],\"source\":{\"display_name\":\"File downloads\"},\"source_id\":\"fileDownloads\"}],\"crossref_event_data_url\":\"https:\\/\\/api.eventdata.crossref.org\\/v1\\/events?rows=1000&filter=from-collected-date:1990-01-01,until-collected-date:2099-01-01,obj-id:10.47852\\/bonviewjcce2202270\",\"doi\":\"10.47852\\/bonviewjcce2202270\",\"metadata\":{\"DOI\":\"10.47852\\/bonviewjcce2202270\",\"ISSN\":[\"2810-9503\"],\"URL\":\"http:\\/\\/dx.doi.org\\/10.47852\\/bonviewjcce2202270\",\"abstract\":\"<jats:p>Recently, networks are moving toward automation and getting more and more intelligent. With the advent of big data and cloud computing technologies, lots and lots of data are being produced on the internet. Every day, petabytes of data are produced from websites, social media sites, or the internet. As more and more data are produced, a continuous threat of network attacks is also growing. An intrusion detection system (IDS) is used to detect such types of attacks in the network. IDS inspects packet headers and data and decides whether the traffic is anomalous or normal based on the contents of the packet. In this research, ML techniques are being used for intrusion detection purposes. Feature selection is also used for efficient and optimal feature selection. The research proposes a hybrid feature selection technique composed of the Pearson correlation coefficient and random forest model. For the machine learning (ML) model, decision tree, AdaBoost, and K-nearest neighbor are trained and tested on the TON_IoT dataset. The dataset is new and contains new and recent attack types and features. For deep learning (DL), multilayer perceptron (MLP) and long short-term memory are trained and tested. Evaluation is done on the basis of accuracy, precision, and recall. It is concluded from the results that the decision tree for ML and MLP for DL provides optimal accuracy with fewer false-positive and false-negative rates. It is also concluded from the results that the ML techniques are effective for detecting intrusion in the networks.<\\/jats:p>\",\"author\":[{\"affiliation\":[],\"name\":\"School of Computing, Edinburgh Napier University, UK\",\"sequence\":\"first\"},{\"affiliation\":[],\"family\":\"Hidayat\",\"given\":\"Imran\",\"sequence\":\"first\"},{\"affiliation\":[],\"family\":\"Ali\",\"given\":\"Muhammad Zulfiqar\",\"sequence\":\"additional\"},{\"affiliation\":[],\"name\":\"James Watt School of Engineering, University of Glasgow, UK\",\"sequence\":\"additional\"},{\"affiliation\":[],\"family\":\"Arshad\",\"given\":\"Arshad\",\"sequence\":\"additional\"},{\"affiliation\":[],\"name\":\"School of Computing, Glasgow Caledonian University, UK\",\"sequence\":\"additional\"}],\"container-title\":\"Journal of Computational and Cognitive Engineering\",\"container-title-short\":\"JCCE\",\"content-domain\":{\"crossmark-restriction\":false,\"domain\":[]},\"created\":{\"date-parts\":[[2022,7,13]],\"date-time\":\"2022-07-13T02:34:58Z\",\"timestamp\":1657679698000},\"crossref_url\":\"https:\\/\\/api.crossref.org\\/works\\/10.47852\\/bonviewjcce2202270\\/transform\\/application\\/vnd.citationstyles.csl+json\",\"deposited\":{\"date-parts\":[[2024,3,11]],\"date-time\":\"2024-03-11T08:47:56Z\",\"timestamp\":1710146876000},\"indexed\":{\"date-parts\":[[2024,9,23]],\"date-time\":\"2024-09-23T04:29:03Z\",\"timestamp\":1727065743942},\"is-referenced-by-count\":24,\"issue\":\"2\",\"issued\":{\"date-parts\":[[2022,7,13]]},\"journal-issue\":{\"issue\":\"2\",\"published-online\":{\"date-parts\":[[2023,5,18]]}},\"member\":\"27601\",\"original-title\":[],\"page\":\"88-97\",\"prefix\":\"10.47852\",\"published\":{\"date-parts\":[[2022,7,13]]},\"published-online\":{\"date-parts\":[[2022,7,13]]},\"publisher\":\"BON VIEW PUBLISHING PTE\",\"reference-count\":0,\"references-count\":0,\"relation\":[],\"resource\":{\"primary\":{\"URL\":\"http:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/view\\/270\"}},\"score\":1,\"short-title\":[],\"source\":\"Crossref\",\"subject\":[],\"subtitle\":[],\"title\":\"Machine Learning-Based Intrusion Detection System: An Experimental Comparison\",\"type\":\"journal-article\",\"volume\":\"2\"},\"open_access\":{\"best_oa_location\":{\"endpoint_id\":null,\"evidence\":\"open (via page says license)\",\"host_type\":\"publisher\",\"is_best\":true,\"license\":\"cc-by\",\"oa_date\":\"2022-07-13\",\"pmh_id\":null,\"repository_institution\":null,\"updated\":\"2023-07-16T12:14:09.862142\",\"url\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"url_for_landing_page\":\"https:\\/\\/doi.org\\/10.47852\\/bonviewjcce2202270\",\"url_for_pdf\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"version\":\"publishedVersion\"},\"data_standard\":2,\"doi\":\"10.47852\\/bonviewjcce2202270\",\"doi_url\":\"https:\\/\\/doi.org\\/10.47852\\/bonviewjcce2202270\",\"first_oa_location\":{\"endpoint_id\":null,\"evidence\":\"open (via page says license)\",\"host_type\":\"publisher\",\"is_best\":true,\"license\":\"cc-by\",\"oa_date\":\"2022-07-13\",\"pmh_id\":null,\"repository_institution\":null,\"updated\":\"2023-07-16T12:14:09.862142\",\"url\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"url_for_landing_page\":\"https:\\/\\/doi.org\\/10.47852\\/bonviewjcce2202270\",\"url_for_pdf\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"version\":\"publishedVersion\"},\"genre\":\"journal-article\",\"has_repository_copy\":true,\"is_oa\":true,\"is_paratext\":false,\"journal_is_in_doaj\":false,\"journal_is_oa\":false,\"journal_issn_l\":\"2810-9570\",\"journal_issns\":\"2810-9503\",\"journal_name\":\"Journal of Computational and Cognitive Engineering\",\"oa_locations\":[{\"endpoint_id\":null,\"evidence\":\"open (via page says license)\",\"host_type\":\"publisher\",\"is_best\":true,\"license\":\"cc-by\",\"oa_date\":\"2022-07-13\",\"pmh_id\":null,\"repository_institution\":null,\"updated\":\"2023-07-16T12:14:09.862142\",\"url\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"url_for_landing_page\":\"https:\\/\\/doi.org\\/10.47852\\/bonviewjcce2202270\",\"url_for_pdf\":\"https:\\/\\/ojs.bonviewpress.com\\/index.php\\/JCCE\\/article\\/download\\/270\\/176\",\"version\":\"publishedVersion\"},{\"endpoint_id\":\"bzdk75m6txycdrxhmdnc\",\"evidence\":\"oa repository (via OAI-PMH doi match)\",\"host_type\":\"repository\",\"is_best\":false,\"license\":\"other-oa\",\"oa_date\":\"2022-12-13\",\"pmh_id\":\"oai:researchonline.gcu.ac.uk:publications\\/f2d18eb9-5b5a-4110-b8b5-deea98486f8d\",\"repository_institution\":\"Glasgow Caledonian University - ResearchOnline\",\"updated\":\"2024-11-06T12:25:17.496680\",\"url\":\"https:\\/\\/researchonline.gcu.ac.uk\\/files\\/63619976\\/JCCE2202270_A1.pdf\",\"url_for_landing_page\":\"https:\\/\\/researchonline.gcu.ac.uk\\/en\\/publications\\/f2d18eb9-5b5a-4110-b8b5-deea98486f8d\",\"url_for_pdf\":\"https:\\/\\/researchonline.gcu.ac.uk\\/files\\/63619976\\/JCCE2202270_A1.pdf\",\"version\":\"publishedVersion\"},{\"endpoint_id\":\"bzdk75m6txycdrxhmdnc\",\"evidence\":\"oa repository (via OAI-PMH doi match)\",\"host_type\":\"repository\",\"is_best\":false,\"license\":\"other-oa\",\"oa_date\":\"2022-12-13\",\"pmh_id\":\"oai:researchonline.gcu.ac.uk:publications\\/f2d18eb9-5b5a-4110-b8b5-deea98486f8d\",\"repository_institution\":\"Glasgow Caledonian University - ResearchOnline\",\"updated\":\"2024-11-06T12:35:36.099871\",\"url\":\"https:\\/\\/researchonline.gcu.ac.uk\\/ws\\/files\\/63619976\\/JCCE2202270_A1.pdf\",\"url_for_landing_page\":\"https:\\/\\/researchonline.gcu.ac.uk\\/ws\\/files\\/63619976\\/JCCE2202270_A1.pdf\",\"url_for_pdf\":\"https:\\/\\/researchonline.gcu.ac.uk\\/ws\\/files\\/63619976\\/JCCE2202270_A1.pdf\",\"version\":\"publishedVersion\"}],\"oa_locations_embargoed\":[],\"oa_status\":\"hybrid\",\"oadoi_url\":\"https:\\/\\/api.oadoi.org\\/v2\\/10.47852\\/bonviewjcce2202270\",\"published_date\":\"2022-07-13\",\"publisher\":\"BON VIEW PUBLISHING PTE\",\"title\":\"Machine Learning-Based Intrusion Detection System: An Experimental Comparison\",\"updated\":\"2024-10-01T13:33:03.713370\",\"year\":2022,\"z_authors\":[{\"name\":\"School of Computing, Edinburgh Napier University, UK\",\"sequence\":\"first\"},{\"family\":\"Hidayat\",\"given\":\"Imran\",\"sequence\":\"first\"},{\"family\":\"Ali\",\"given\":\"Muhammad Zulfiqar\",\"sequence\":\"additional\"},{\"name\":\"James Watt School of Engineering, University of Glasgow, UK\",\"sequence\":\"additional\"},{\"family\":\"Arshad\",\"given\":\"Arshad\",\"sequence\":\"additional\"},{\"name\":\"School of Computing, Glasgow Caledonian University, UK\",\"sequence\":\"additional\"}]}}'), minItemsToShowGraph: { minEventsForYearly: 10, minEventsForMonthly: 10, minEventsForDaily: 6, minYearsForYearly: 3, minMonthsForMonthly: 2, minDaysForDaily: 1 //first 30 days only }, graphheight: 150, graphwidth: 300, showTitle: false, showMini: false, published_date: [2022, 7, 13], } var paperbuzzviz = undefined; paperbuzzviz = new PaperbuzzViz(options); paperbuzzviz.initViz(); } </script> </div> </div><!-- .main_entry --> <div class="entry_details"> <div class="item cover_image"> <div class="sub_item"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/issue/view/47"> <img src="https://ojs.bonviewpress.com/public/journals/4/cover_issue_47_en_US.png" alt=""> </a> </div> </div> <div class="item galleys"> <h2 class="pkp_screen_reader"> Downloads </h2> <ul class="value galleys_links"> <li> <a class="obj_galley_link pdf" href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/270/176"> PDF </a> </li> </ul> </div> <div class="item published"> <section class="sub_item"> <h2 class="label"> Published </h2> <div class="value"> <span>2022-07-13</span> </div> </section> </div> <div class="item issue"> <section class="sub_item"> <h2 class="label"> Issue </h2> <div class="value"> <a class="title" href="https://ojs.bonviewpress.com/index.php/JCCE/issue/view/47"> Vol. 2 No. 2 (2023) </a> </div> </section> <section class="sub_item"> <h2 class="label"> Section </h2> <div class="value"> Research Articles </div> </section> </div> <div class="item copyright"> <h2 class="label"> License </h2> <p>Copyright (c) 2022 Authors</p> <a rel="license" href="https://creativecommons.org/licenses/by/4.0/"><img alt="Creative Commons License" src="//i.creativecommons.org/l/by/4.0/88x31.png" /></a><p>This work is licensed under a <a rel="license" href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.</p> </div> <div class="item citation"> <section class="sub_item citation_display"> <h2 class="label"> How to Cite </h2> <div class="value"> <div id="citationOutput" role="region" aria-live="polite"> <div class="csl-bib-body"> <div class="csl-entry">Hidayat, I., Ali, M. Z., & Arshad, A. (2022). Machine Learning-Based Intrusion Detection System: An Experimental Comparison. <i>Journal of Computational and Cognitive Engineering</i>, <i>2</i>(2), 88-97. <a href="https://doi.org/10.47852/bonviewJCCE2202270">https://doi.org/10.47852/bonviewJCCE2202270</a></div> </div> </div> <div class="citation_formats"> <button class="citation_formats_button label" aria-controls="cslCitationFormats" aria-expanded="false" data-csl-dropdown="true"> More Citation Formats </button> <div id="cslCitationFormats" class="citation_formats_list" aria-hidden="true"> <ul class="citation_formats_styles"> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/acm-sig-proceedings?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/acm-sig-proceedings?submissionId=270&publicationId=1443&issueId=47&return=json" > ACM </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/acs-nano?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/acs-nano?submissionId=270&publicationId=1443&issueId=47&return=json" > ACS </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/apa?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/apa?submissionId=270&publicationId=1443&issueId=47&return=json" > APA </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/associacao-brasileira-de-normas-tecnicas?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/associacao-brasileira-de-normas-tecnicas?submissionId=270&publicationId=1443&issueId=47&return=json" > ABNT </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/chicago-author-date?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/chicago-author-date?submissionId=270&publicationId=1443&issueId=47&return=json" > Chicago </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/harvard-cite-them-right?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/harvard-cite-them-right?submissionId=270&publicationId=1443&issueId=47&return=json" > Harvard </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/ieee?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/ieee?submissionId=270&publicationId=1443&issueId=47&return=json" > IEEE </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/modern-language-association?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/modern-language-association?submissionId=270&publicationId=1443&issueId=47&return=json" > MLA </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/turabian-fullnote-bibliography?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/turabian-fullnote-bibliography?submissionId=270&publicationId=1443&issueId=47&return=json" > Turabian </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/vancouver?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/vancouver?submissionId=270&publicationId=1443&issueId=47&return=json" > Vancouver </a> </li> <li> <a aria-controls="citationOutput" href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/ama?submissionId=270&publicationId=1443&issueId=47" data-load-citation data-json-href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/get/ama?submissionId=270&publicationId=1443&issueId=47&return=json" > AMA </a> </li> </ul> <div class="label"> Download Citation </div> <ul class="citation_formats_styles"> <li> <a href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/download/ris?submissionId=270&publicationId=1443&issueId=47"> <span class="fa fa-download"></span> Endnote/Zotero/Mendeley (RIS) </a> </li> <li> <a href="https://ojs.bonviewpress.com/index.php/JCCE/citationstylelanguage/download/bibtex?submissionId=270&publicationId=1443&issueId=47"> <span class="fa fa-download"></span> BibTeX </a> </li> </ul> </div> </div> </div> </section> </div> <div class="item addthis"> <div class="value"> <!-- AddThis Button BEGIN --> <div class="addthis_toolbox addthis_default_style addthis_32x32_style"> <a class="addthis_button_preferred_1"></a> <a class="addthis_button_preferred_2"></a> <a class="addthis_button_preferred_3"></a> <a class="addthis_button_preferred_4"></a> <a class="addthis_button_compact"></a> <a class="addthis_counter addthis_bubble_style"></a> </div> <script type="text/javascript" src="//s7.addthis.com/js/250/addthis_widget.js#pubid="></script> <!-- AddThis Button END --> </div> </div> <div id="citation-plugin" class="item citations-container" data-citations-url="https://ojs.bonviewpress.com/index.php/JCCE/citations/get?doi=10.47852%2FbonviewJCCE2202270" data-img-url="https://ojs.bonviewpress.com/plugins/generic/citations/images/"> <div id="citations-loader"></div> <div class="citations-count"> <div class="citations-count-crossref"> <img class="img-fluid" src="https://ojs.bonviewpress.com/plugins/generic/citations/images/crossref.png" alt="Crossref"/> <div class="badge_total"></div> </div> <div class="citations-count-scopus"> <img src="https://ojs.bonviewpress.com/plugins/generic/citations/images/scopus.png" alt="Scopus"/> <br/> <span class="badge_total"></span> </div> <div class="citations-count-google"> <a href="https://scholar.google.com/scholar?q=10.47852/bonviewJCCE2202270" target="_blank" rel="noreferrer"> <img src="https://ojs.bonviewpress.com/plugins/generic/citations/images/scholar.png" alt="Google Scholar"/> </a> </div> <div class="citations-count-europepmc"> <a href="https://europepmc.org/search?scope=fulltext&query=10.47852/bonviewJCCE2202270" target="_blank" rel="noreferrer"> <img src="https://ojs.bonviewpress.com/plugins/generic/citations/images/pmc.png" alt="Europe PMC"/> <br/> <span class="badge_total"></span> </a> </div> </div> <div class="citations-list"> <div class="cite-itm cite-prototype" style="display: none"> <img class="cite-img img-fluid" src="" alt=""> <div> <span class="cite-author"></span> <span class="cite-date"></span> </div> <div> <span class="cite-title"></span> <span class="cite-info"></span> </div> <div class="cite-doi"></div> </div> </div> <style> .citations-container { overflow-y: auto; overflow-x: hidden; max-height: 300px; } </style> </div> </div><!-- .entry_details --> </div><!-- .row --> </article> </div><!-- .page --> </div><!-- pkp_structure_main --> <div class="pkp_structure_sidebar left" role="complementary"> <div class="pkp_block block_custom" id="customblock-right_links"> <h2 class="title">Journal Information</h2> <div class="content"> <div class="journalcard__metrics border"> <div class="journalcard__metrics border"><span class="sc-hwwEjo cdchLr"><strong>Editor-in-Chief:</strong> <span class=" jgG6ef">Harish Garg</span></span></div> <div class="journalcard__metrics border"><span class="sc-hwwEjo cdchLr">Thapar Institute of Engineering and Technology, India</span></div> <div class="journalcard__metrics border"><span class="sc-hwwEjo cdchLr"><strong>Frequency: </strong>Quarterly</span></div> <div class="journalcard__metrics border"><span class="sc-hwwEjo cdchLr"><strong>Submission to First Decision: </strong>21 days<br><strong>Submission to Acceptance:</strong> <span class="sc-kPVwWT hZDpyF">95 days</span><br><strong>Accept to Publish:</strong> <span class="sc-kPVwWT hZDpyF">15 days</span></span></div> <div class="journalcard__metrics border"><span class="sc-kPVwWT hZDpyF"><span class="sc-hwwEjo cdchLr"><strong>Acceptance Rate: </strong>21%</span></span></div> <div class="journalcard__metrics border"><span class="sc-kPVwWT hZDpyF"><span class="sc-hwwEjo cdchLr"><strong>eISSN:</strong> 2810-9503</span></span></div> <div class="journalcard__metrics border"><span class="sc-kPVwWT hZDpyF"><span class="sc-hwwEjo cdchLr"><strong>pISSN:</strong> 2810-9570 </span></span></div> </div> <div class="journalcard__metrics border"> <p class="journalcard__metrics border">漏 2024 Bon View Publishing Pte Ltd.</p> </div> </div> </div> <div class="pkp_block block_make_submission"> <h2 class="pkp_screen_reader"> Make a Submission </h2> <div class="content"> <a class="block_make_submission_link" href="https://ojs.bonviewpress.com/index.php/JCCE/about/submissions"> Make a Submission </a> </div> </div> <style type="text/css"> .block_announcements_article:not(:last-child) { padding-bottom: 1.5em; border-bottom: 1px solid; } .block_announcements_article { text-align: left; } .block_announcements #show-all{ font-style: italic; } </style> <div class="pkp_block block_announcements"> <h2 class="title">Announcements</h2> <div class="content"> <article class="block_announcements_article"> <h3 class="block_announcements_article_headline"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/announcement/view/81"> First CiteScore Released: 13.5 </a> </h3> <time class="block_announcements_article_date" datetime="2024-06-06"> <strong>June 6, 2024</strong> </time> <div class="block_announcements_article_content"> <p>We are delighted to announce that the CiteScore 2023 for the <em>Journal of Computational and Cognitive Engineering</em> is <strong>13.5</strong>, which ranks it 9 out of 204 journals in the Engineering (miscellaneous) category and 53 out of 817 journals in the Computer Science Applications category.<br><br>This achievement reflects the dedication and hard work of our editorial team, authors, and reviewers. We are immensely grateful for the valuable contributions and unwavering support from our community. This milestone not only highlights the quality of research we publish but also sets a higher standard for our future endeavors.<br><br>Thank you to everyone who has been a part of this journey. We look forward to continuing to provide cutting-edge research and making significant impacts in our field.</p> </div> </article> <article class="block_announcements_article"> <h3 class="block_announcements_article_headline"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/announcement/view/79"> JCCE Published Volume 3, Issue 2 on May 21, 2024 </a> </h3> <time class="block_announcements_article_date" datetime="2024-05-21"> <strong>May 21, 2024</strong> </time> <div class="block_announcements_article_content"> <p>We are excited to announce that聽<em><strong>Journal of Computational and Cognitive Engineering (JCCE)聽</strong></em>published Volume 3 Issue 2 on May 21, 2024.</p> </div> </article> <article class="block_announcements_article"> <h3 class="block_announcements_article_headline"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/announcement/view/71"> STM Membership Announcement </a> </h3> <time class="block_announcements_article_date" datetime="2024-04-24"> <strong>April 24, 2024</strong> </time> <div class="block_announcements_article_content"> <p>Bon View Publishing Pte. Ltd. proudly announces its membership in the esteemed聽<a href="https://www.stm-assoc.org/"><u>International Association of Scientific, Technical and Medical Publishers(STM)</u></a>, effective 2024. This collaboration marks a significant milestone in advancing global knowledge exchange and promoting cutting-edge research.</p> </div> </article> <a id="show-all" href="https://ojs.bonviewpress.com/index.php/JCCE/announcement">Show all announcements ...</a> </div> </div> <div class="pkp_block block_keyword_cloud"> <h2 class="title">Keywords</h2> <div class="content" id='wordcloud'></div> <script> function randomColor() { var cores = ['#1f77b4', '#ff7f0e', '#2ca02c', '#d62728', '#9467bd', '#8c564b', '#e377c2', '#7f7f7f', '#bcbd22', '#17becf']; return cores[Math.floor(Math.random()*cores.length)]; } document.addEventListener("DOMContentLoaded", function() { var keywords = [{"text":"sit-yolov9","size":1},{"text":"sitbehaviors dataset","size":1},{"text":"home environment","size":1},{"text":"learning behavior recognition","size":1},{"text":"image enhancement","size":1},{"text":"stealth protocols","size":1},{"text":"obfsproxy","size":1},{"text":"shadowsocks","size":1},{"text":"wireguard","size":1},{"text":" vpns","size":1},{"text":"internet service providers","size":1},{"text":"proxying strategies","size":1},{"text":"fire-vit","size":1},{"text":"tunnel fire dataset","size":1},{"text":" tunnel fire detection","size":1},{"text":"fire alarm","size":1},{"text":"visual transformer","size":1},{"text":"e-commerce","size":1},{"text":" recurrent neural network (rnn)","size":1},{"text":"authorship","size":1},{"text":"suspicion","size":1},{"text":"spam indicators","size":1},{"text":"artificial intelligence (ai)","size":1},{"text":"machine learning (ml)","size":1},{"text":"healthcare","size":1},{"text":"patient record","size":1},{"text":"clinical applications","size":1},{"text":"ethical considerations,","size":1},{"text":"explainable ai (xai)","size":1},{"text":"xgboost","size":1},{"text":"whale optimization algorithm (woa)","size":1},{"text":"anomalies detection","size":1},{"text":"manufacturing","size":1},{"text":"industry 4.0","size":1},{"text":"digital transformation","size":1},{"text":"corporate esg performance","size":1},{"text":" green technology innovation","size":1},{"text":"corporate social responsibility","size":1},{"text":" corporate internal control","size":1},{"text":"esg development","size":1},{"text":"soft computing","size":1},{"text":"human-centric solutions","size":1},{"text":"challenges","size":1},{"text":"artificial intelligence","size":1},{"text":"fuzzy logic","size":1},{"text":"image moments","size":1},{"text":"polar harmonic transform (pht)","size":1},{"text":"topological data analysis","size":1},{"text":" image reconstruction","size":1},{"text":"diversity and serendipity preference","size":1}]; var totalWeight = 0; var blockWidth = 300; var blockHeight = 200; var transitionDuration = 200; var length_keywords = keywords.length; var layout = d3.layout.cloud(); layout.size([blockWidth, blockHeight]) .words(keywords) .fontSize(function(d) { return fontSize(+d.size); }) .on('end', draw); var svg = d3.select("#wordcloud").append("svg") .attr("viewBox", "0 0 " + blockWidth + " " + blockHeight) .attr("width", '100%'); function update() { var words = layout.words(); fontSize = d3.scaleLinear().range([16, 34]); if (words.length) { fontSize.domain([+words[words.length - 1].size || 1, +words[0].size]); } } keywords.forEach(function(item,index){totalWeight += item.size;}); update(); function draw(words, bounds) { var width = layout.size()[0], height = layout.size()[1]; scaling = bounds ? Math.min( width / Math.abs(bounds[1].x - width / 2), width / Math.abs(bounds[0].x - width / 2), height / Math.abs(bounds[1].y - height / 2), height / Math.abs(bounds[0].y - height / 2), ) / 2 : 1; svg .append("g") .attr( "transform", "translate(" + [width >> 1, height >> 1] + ")scale(" + scaling + ")", ) .selectAll("text") .data(words) .enter().append("text") .style("font-size", function(d) { return d.size + "px"; }) .style("font-family", 'serif') .style("fill", randomColor) .style('cursor', 'pointer') .style('opacity', 0.7) .attr('class', 'keyword') .attr("text-anchor", "middle") .attr("transform", function(d) { return "translate(" + [d.x, d.y] + ")rotate(" + d.rotate + ")"; }) .text(function(d) { return d.text; }) .on("click", function(d, i){ window.location = "https://ojs.bonviewpress.com/index.php/index/search?query=QUERY_SLUG".replace(/QUERY_SLUG/, encodeURIComponent(''+d.text+'')); }) .on("mouseover", function(d, i) { d3.select(this).transition() .duration(transitionDuration) .style('font-size',function(d) { return (d.size + 3) + "px"; }) .style('opacity', 1); }) .on("mouseout", function(d, i) { d3.select(this).transition() .duration(transitionDuration) .style('font-size',function(d) { return d.size + "px"; }) .style('opacity', 0.7); }) .on('resize', function() { update() }); } layout.start(); }); </script> </div> <div class="pkp_block block_developed_by"> <div class="content"> <span class="title">Most Read</span> <ul class="most_read"> <li class="most_read_article"> <div class="most_read_article_title"><a href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/174">Implementation of Artificial Intelligence in Agriculture</a></div> <div class="most_read_article_journal"><span class="fa fa-eye"></span> 3121</div> </li> <li class="most_read_article"> <div class="most_read_article_title"><a href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/838">Comparing BERT Against Traditional Machine Learning Models in Text Classification</a></div> <div class="most_read_article_journal"><span class="fa fa-eye"></span> 1471</div> </li> <li class="most_read_article"> <div class="most_read_article_title"><a href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/245">A Systematic Review on Intelligent Transport Systems</a></div> <div class="most_read_article_journal"><span class="fa fa-eye"></span> 1158</div> </li> <li class="most_read_article"> <div class="most_read_article_title"><a href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/192">Spam Detection Using Bidirectional Transformers and Machine Learning Classifier Algorithms</a></div> <div class="most_read_article_journal"><span class="fa fa-eye"></span> 1102</div> </li> <li class="most_read_article"> <div class="most_read_article_title"><a href="https://ojs.bonviewpress.com/index.php/JCCE/article/view/270">Machine Learning-Based Intrusion Detection System: An Experimental Comparison</a></div> <div class="most_read_article_journal"><span class="fa fa-eye"></span> 1034</div> </li> </ul> </div> </div> </div><!-- pkp_sidebar.left --> </div><!-- pkp_structure_content --> <div class="pkp_structure_footer_wrapper" role="contentinfo"> <a id="pkp_content_footer"></a> <div class="pkp_structure_footer"> <div class="pkp_footer_content"> <p>聽<a href="http://creativecommons.org/licenses/by/4.0/"><img src="https://ojs.bonviewpress.com/public/site/images/admin/88x31.png" alt="" width="88" height="31" /></a>All site content, except where otherwise noted, is licensed under a <a href="http://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</a>.</p> <p>pISSN 2810-9570, eISSN 2810-9503 | Published by <a href="http://www.bonviewpress.com/">Bon View Publishing Pte Ltd.</a></p> <p><strong>Member of</strong></p> <p><img style="width: 900px; height: 70px;" src="https://bonview.oss-ap-southeast-1.aliyuncs.com/resource/ojs-logo-quanji.png" />聽</p> </div> <div class="pkp_brand_footer"> <a href="https://ojs.bonviewpress.com/index.php/JCCE/about/aboutThisPublishingSystem"> <img alt="More information about the publishing system, Platform and Workflow by OJS/PKP." src="https://ojs.bonviewpress.com/templates/images/ojs_brand.png"> </a> </div> </div> </div><!-- pkp_structure_footer_wrapper --> </div><!-- pkp_structure_page --> <script src="https://ojs.bonviewpress.com/lib/pkp/lib/vendor/components/jquery/jquery.min.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/lib/pkp/lib/vendor/components/jqueryui/jquery-ui.min.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/themes/default/js/lib/popper/popper.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/themes/default/js/lib/bootstrap/util.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/themes/default/js/lib/bootstrap/dropdown.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/themes/default/js/main.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/generic/citationStyleLanguage/js/articleCitation.js?v=3.4.0.7" type="text/javascript"></script><script src="https://d3js.org/d3.v4.js?v=3.4.0.7" type="text/javascript"></script><script src="https://cdnjs.cloudflare.com/ajax/libs/d3-tip/0.9.1/d3-tip.min.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/generic/paperbuzz/paperbuzzviz/paperbuzzviz.js?v=3.4.0.7" type="text/javascript"></script><script src="https://ojs.bonviewpress.com/plugins/generic/citations/js/citations.js?v=3.4.0.7" type="text/javascript"></script><script src="https://cdn.jsdelivr.net/gh/holtzy/D3-graph-gallery@master/LIB/d3.layout.cloud.js?v=3.4.0.7" type="text/javascript"></script><script type="text/javascript"> (function (w, d, s, l, i) { w[l] = w[l] || []; var f = d.getElementsByTagName(s)[0], j = d.createElement(s), dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = 'https://www.googletagmanager.com/gtag/js?id=' + i + dl; f.parentNode.insertBefore(j, f); function gtag(){dataLayer.push(arguments)}; gtag('js', new Date()); gtag('config', i); }) (window, document, 'script', 'dataLayer', 'UA-284252596-1'); </script> </body> </html>