Abstract
In the redesign field, popularly known as optimization, such difficulties degenerate the exordium of smoothing out appraisals that performed well on benchmark cutoff focuses or essential setting-centered evaluations. To visually examine the commencement of techniques procured for smoothing out those conditions, scientists and experts felt a need to agnize the difficulties and break harmonious changes, modifications, and amendments in the evaluations to oversee such hardships. As of tardy, there has been actuating examination interest in orchestrating machine learning (ML) strategies into meta-heuristics for managing combinatorial smoothing out conditions. This joining betokens meta-heuristics towards a capable, abundant, and exuberant seek after. It also transmutes their exhibition much indistinguishably commensurate to procedure quality, cumulation rate, and energy. Since sundry getting procedures together with sundry purposes, we have incited an objective to review the early advances in utilizing ML techniques to revise meta-heuristics. To fill up this gap survey gives such an audit on the utilization of AI methods in the approach of sundry components of meta-heuristics for purposes behind computation winnows utilizing absolute execution limits. The adequacy of move and quantify is transmuted by refreshing ML evaluations using meta-heuristic redressment computations. In the review, seventeen ML-predicated evaluations we have applied for benchmarking datasets and conspicuous legitimate time tests for tasks and figures we have imparted. Pushing toward portions covers the energy-moving assessment subjects coordinating progressed ML-predicated seventeen evaluations execution and gives examiners some spellbinding pieces of erudition to utilize in their generous applications spaces of pay. This book region causes assembled well-kenned ML approaches to dissever the spam and ham comments. There may be so many obstacles in cyber security, such as Malware, Worm, viruses, SQL Injection, etc. One of them is Spam. It is a typical binary case where the output must be binary. We will examine from a large dataset through the meta-heuristic function, which one among 17 applied algorithms is the optimized one for the binary cases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Hasan, M.M. Islam, M.I.I. Zarif, M.M.A. Hashem, Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things 7, 100059 (2019). https://doi.org/10.1016/j.iot.2019.100059
M. El-Dairi, R.J. House, Optic nerve hypoplasia, in Handbook of Pediatric Retinal OCT and the Eye-Brain Connection (2019), pp. 285–287. https://doi.org/10.1016/B978-0-323-60984-5.00062-7
A. Benussi et al., Classification accuracy of TMS for the diagnosis of mild cognitive impairment. Brain Stimul. 14(2), 241–249 (2021). https://doi.org/10.1016/j.brs.2021.01.004
S. Rao, A.K. Verma, T. Bhatia, A review on social spam detection: challenges, open issues, and future directions. Expert Syst. Appl. 186, (2021). https://doi.org/10.1016/j.eswa.2021.115742
A. Mewada, R.K. Dewang, Research on false review detection methods: a state-of-the-art review, J. King Saud Univ. Comput. Inf. Sci. (2021). https://doi.org/10.1016/j.jksuci.2021.07.021
R. Kaur, S. Singh, H. Kumar, Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112, 53–88 (2018). https://doi.org/10.1016/j.jnca.2018.03.015
R.M.K. Saeed, S. Rady, T.F. Gharib, An ensemble approach for spam detection in Arabic opinion texts. J. King Saud Univ. Comput. Inf. Sci. (2019). https://doi.org/10.1016/j.jksuci.2019.10.002
R. Kumar et al., Smart city and cyber-security; technologies used, leading challenges and future recommendations. J. King Saud Univ. Comput. Inf. Sci. 7, 7999–8012 (2021). https://doi.org/10.1016/j.proeng.2016.11.813
C. Feltus, Current and future RL’s contribution to emerging network security. Procedia Comput. Sci. 177, 516–521 (2020). https://doi.org/10.1016/j.procs.2020.10.071
N. Gupta, V. Jindal, P. Bedi, LIO-IDS: handling class imbalance using LSTM and improved one-vs-one technique in intrusion detection system. Comput. Netw. 192, (2021). https://doi.org/10.1016/j.comnet.2021.108076
J.I. Alcaide, R.G. Llave, Critical infrastructures cybersecurity and the maritime sector. Transp. Res. Procedia 45, 547–554 (2020). https://doi.org/10.1016/j.trpro.2020.03.058
K.K. Tho, S. Swaddiwudhipong, Z.S. Liu, J. Hua, Artificial neural network model for material characterization by indentation. Model. Simul. Mater. Sci. Eng. (2004). https://doi.org/10.1088/0965-0393/12/5/019
M.A. Jan et al., Security and blockchain convergence with internet of multimedia things: current trends, research challenges and future directions. J. Netw. Comput. Appl. 175, 102918 (2021). https://doi.org/10.1016/j.jnca.2020.102918
K.O. Lye, S. Mishra, D. Ray, P. Chandrashekar, Iterative surrogate model optimization (ISMO): an active learning algorithm for PDE constrained optimization with deep neural networks. Comput. Methods Appl. Mech. Eng. 374, 113575 (2021). https://doi.org/10.1016/j.cma.2020.113575
A. Shokry, S. Medina-González, P. Baraldi, E. Zio, E. Moulines, A. Espuña, A machine learning-based methodology for multi-parametric solution of chemical processes operation optimization under uncertainty. Chem. Eng. J. 425, (2021). https://doi.org/10.1016/j.cej.2021.131632
Y. Morita, S. Rezaeiravesh, N. Tabatabaei, R. Vinuesa, K. Fukagata, P. Schlatter, Applying Bayesian optimization with Gaussian process regression to computational fluid dynamics problems. J. Comput. Phys. 449, 110788 (2022). https://doi.org/10.1016/j.jcp.2021.110788
B.S. Oh, J. Cho, B. Choi, H.W. Choi, M.S. Kim, G. Lee, Application of heuristic algorithms for design optimization of industrial heat pump. Int. J. Refrig. (2021). https://doi.org/10.1016/j.ijrefrig.2021.11.002
M.M. Rahman, G. Szabó, Multi-objective urban land use optimization using spatial data: a systematic review. Sustain. Cities Soc. 74, (2021). https://doi.org/10.1016/j.scs.2021.103214
D. Ahamad, S. Alam Hameed, M. Akhtar, A multi-objective privacy preservation model for cloud security using hybrid Jaya-based shark smell optimization. J. King Saud Univ. Comput. Inf. Sci. (2020). https://doi.org/10.1016/j.jksuci.2020.10.015
S. Thakur, A. Chakraborty, R. De, N. Kumar, R. Sarkar, Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Comput. Electr. Eng. 91, (2021). https://doi.org/10.1016/j.compeleceng.2021.107044
S. Gupta, J. Sarkar, A. Banerjee, N.R. Bandyopadhyay, S. Ganguly, Grain boundary detection and phase segmentation of SEM ferrite-pearlite microstructure using SLIC and skeletonization. J. Inst. Eng. Ser. D 100(2), 203–210 (2019). https://doi.org/10.1007/s40033-019-00194-1
G. Baldini, R. Giuliani, M. Gemo, F. Dimc, On the application of sensor authentication with intrinsic physical features to vehicle security. Comput. Electr. Eng. 91, (2021). https://doi.org/10.1016/j.compeleceng.2021.107053
M. Orabi, D. Mouheb, Z. Al Aghbari, I. Kamel, Detection of bots in social media: a systematic review. Inf. Process. Manag. 57(4), 102250 (2020). https://doi.org/10.1016/j.ipm.2020.102250
S. Gupta, Chan-Vese segmentation of SEM ferritepearlite microstructure and prediction of grain boundary. Int. J. Innov. Technol. Explor. Eng. 8(10), 1495–1498 (2019). https://doi.org/10.35940/ijitee.A1024.0881019
S. Gupta et al., Modelling the steel microstructure knowledge for in-silico recognition of phases using machine learning. Mater. Chem. Phys. 252, 123286 (2020). https://doi.org/10.1016/j.matchemphys.2020.123286
I.H. Sarker, CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things 14, 100393 (2021). https://doi.org/10.1016/j.iot.2021.100393
N. Al-Azzam, I. Shatnawi, Comparing supervised and semi-supervised machine learning models on diagnosing breast cancer. Ann. Med. Surg. 62(January), 53–64 (2021). https://doi.org/10.1016/j.amsu.2020.12.043
E.G. Dada, J.S. Bassi, H. Chiroma, S.M. Abdulhamid, A.O. Adetunmbi, O.E. Ajibuwa, Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6), (2019). https://doi.org/10.1016/j.heliyon.2019.e01802
A. Ligthart, C. Catal, B. Tekinerdogan, Analyzing the effectiveness of semi-supervised learning approaches for opinion spam classification. Appl. Soft Comput. 101, 107023 (2021). https://doi.org/10.1016/j.asoc.2020.107023
S. Padmavathi, E. Ramanujam, Naïve Bayes classifier for ECG abnormalities using multivariate maximal time series motif. Procedia Comput. Sci. 47(C), 222–228 (2014). https://doi.org/10.1016/j.procs.2015.03.201
J. Gola et al., Advanced microstructure classification by data mining methods. Comput. Mater. Sci. 148, 324–335 (2018). https://doi.org/10.1016/j.commatsci.2018.03.004
H.E. Kiziloz, Classifier ensemble methods in feature selection. Neurocomputing 419, 97–107 (2021). https://doi.org/10.1016/j.neucom.2020.07.113
S.M. Piryonesi, T.E. El-Diraby, Role of data analytics in infrastructure asset management: overcoming data size and quality problems. J. Transp. Eng. Part B Pavements 146(2), 04020022 (2020). https://doi.org/10.1061/jpeodx.0000175
I.H. Sarker, Y.B. Abushark, F. Alsolami, A.I. Khan, IntruDTree: a machine learning based cyber security intrusion detection model. Symmetry (Basel) 12(5), (2020). https://doi.org/10.3390/SYM12050754
I. Stellios, P. Kotzanikolaou, C. Grigoriadis, Assessing IoT enabled cyber-physical attack paths against critical systems. Comput. Secur. 107, 102316 (2021). https://doi.org/10.1016/j.cose.2021.102316
I.H. Sarker, A machine learning based robust prediction model for real-life mobile phone data. Internet Things 5, 180–193 (2019). https://doi.org/10.1016/j.iot.2019.01.007
B. Ning, W. Junwei, H. Feng, Spam message classification based on the Naïve Bayes classification algorithm. IAENG Int. J. Comput. Sci. 46(1), (2019)
S. Gupta, J. Sarkar, M. Kundu, N.R. Bandyopadhyay, S. Ganguly, Automatic recognition of SEM microstructure and phases of steel using LBP and random decision forest operator. Measurement 151, 107224 (2020). https://doi.org/10.1016/j.measurement.2019.107224
A. Shahim, Security of the digital transformation. Comput. Secur. 108, 102345 (2021). https://doi.org/10.1016/j.cose.2021.102345
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Mondal, B., Chakraborty, D., Bhattacherjee, N.K., Mukherjee, P., Neogi, S., Gupta, S. (2022). Review for Meta-Heuristic Optimization Propels Machine Learning Computations Execution on Spam Comment Area Under Digital Security Aegis Region. In: Houssein, E.H., Abd Elaziz, M., Oliva, D., Abualigah, L. (eds) Integrating Meta-Heuristics and Machine Learning for Real-World Optimization Problems. Studies in Computational Intelligence, vol 1038. Springer, Cham. https://doi.org/10.1007/978-3-030-99079-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-99079-4_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99078-7
Online ISBN: 978-3-030-99079-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)