A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2022-08-06

AUTHORS

Fatemeh Hosseini, Farhad Soleimanian Gharehchopogh, Mohammad Masdari

ABSTRACT

The Internet of Things (IoT) is an emerging network that has experienced a lot of progress due to extensive developments and development in this network. Due to the increased number of IoT devices, it is endangered by a botnet-type attack. Many intrusion detection systems do not have the necessary and sufficient ability to detect and prevent such attacks. Intrusion detection systems (IDSs) have provided various promising solutions to discover malicious patterns and deal with botnet attacks. Many researchers have studied the effect of reducing the number of features of datasets on the detection performance of IoT attacks. Selecting several features from a dataset is a data mining technique effectively integrated into botnet detection and identification systems design. This paper presents a new botnet detection system to detect botnets in IoT using the feature selection technique based on the slime mold algorithm (SMA) and salp swarm algorithm (SSA). On the other hand, the number of features and the importance of features selected from the dataset can directly impact the detection error rate. Therefore, we have presented a new practical and efficient multi-objective algorithm for detecting botnets based on feature selection. To maximize the performance of the proposed algorithm, we have used chaos theory. In addition, we have integrated the mechanism of the Disruption operator with the proposed algorithm. An excellent balance is created in the components of exploration and exploitation. Finally, to check and evaluate the proposed algorithm, the standard datasets available in the UCI source, created based on the real traffic of infected devices on the IoT botnet, have been used. The results obtained from the proposed algorithm indicate a significant and good performance. The results show that it has a high ability to detect botnets in IoT networks and has been able to achieve an excellent low error rate. More... »

PAGES

809-843

References to SciGraph publications

  • 2021-04-05. Energy and Cost-Aware Workflow Scheduling in Cloud Computing Data Centers Using a Multi-objective Optimization Algorithm in JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
  • 2019-11-12. Multi-objective Particle Swarm Optimization for Botnet Detection in Internet of Things in EVOLUTIONARY MACHINE LEARNING TECHNIQUES
  • 2018-03-28. Secure and optimal authentication framework for cloud management using HGAPSO algorithm in CLUSTER COMPUTING
  • 2022-03-28. An Improved Tunicate Swarm Algorithm with Best-random Mutation Strategy for Global Optimization Problems in JOURNAL OF BIONIC ENGINEERING
  • 2018-03-07. A novel chaotic salp swarm algorithm for global optimization and feature selection in APPLIED INTELLIGENCE
  • 2019-07-06. A comprehensive survey on symbiotic organisms search algorithms in ARTIFICIAL INTELLIGENCE REVIEW
  • 2022-03-19. A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems in JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
  • 2018-03-13. Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system in CLUSTER COMPUTING
  • 2021-05-31. An efficient harris hawk optimization algorithm for solving the travelling salesman problem in CLUSTER COMPUTING
  • 2019-07-13. Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection in JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
  • 2021-03-09. A multi-objective optimization algorithm for feature selection problems in ENGINEERING WITH COMPUTERS
  • 2022-07-01. A Hybrid Moth Flame Optimization Algorithm for Global Optimization in JOURNAL OF BIONIC ENGINEERING
  • 2018-06-08. Applying VorEAl for IoT Intrusion Detection in HYBRID ARTIFICIAL INTELLIGENT SYSTEMS
  • 2011-09-03. Multi-objective Optimisation Using Evolutionary Algorithms: An Introduction in MULTI-OBJECTIVE EVOLUTIONARY OPTIMISATION FOR PRODUCT DESIGN AND MANUFACTURING
  • 2021-07-05. Advances in Spotted Hyena Optimizer: A Comprehensive Survey in ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING
  • 2010-08-06. A novel Hash algorithm construction based on chaotic neural network in NEURAL COMPUTING AND APPLICATIONS
  • 2020-03-31. A Modified Multi-objective Particle Swarm Optimizer-Based Lévy Flight: An Approach Toward Intrusion Detection in Internet of Things in ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
  • 2021-03-20. Chaotic vortex search algorithm: metaheuristic algorithm for feature selection in EVOLUTIONARY INTELLIGENCE
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s00354-022-00188-w

    DOI

    http://dx.doi.org/10.1007/s00354-022-00188-w

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1150047736


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran", 
              "id": "http://www.grid.ac/institutes/grid.466826.8", 
              "name": [
                "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hosseini", 
            "givenName": "Fatemeh", 
            "id": "sg:person.015542671622.07", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015542671622.07"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran", 
              "id": "http://www.grid.ac/institutes/grid.466826.8", 
              "name": [
                "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Gharehchopogh", 
            "givenName": "Farhad Soleimanian", 
            "id": "sg:person.016340661571.42", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016340661571.42"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran", 
              "id": "http://www.grid.ac/institutes/grid.466826.8", 
              "name": [
                "Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Masdari", 
            "givenName": "Mohammad", 
            "id": "sg:person.015400364315.00", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015400364315.00"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/s10586-018-2609-x", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101820831", 
              "https://doi.org/10.1007/s10586-018-2609-x"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10922-022-09653-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1146415303", 
              "https://doi.org/10.1007/s10922-022-09653-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10462-019-09733-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1117804434", 
              "https://doi.org/10.1007/s10462-019-09733-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10489-018-1158-6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101370562", 
              "https://doi.org/10.1007/s10489-018-1158-6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s42235-022-00207-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1149155543", 
              "https://doi.org/10.1007/s42235-022-00207-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00521-010-0432-2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035294720", 
              "https://doi.org/10.1007/s00521-010-0432-2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-981-32-9990-0_10", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1122484171", 
              "https://doi.org/10.1007/978-981-32-9990-0_10"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-0-85729-652-8_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1040277102", 
              "https://doi.org/10.1007/978-0-85729-652-8_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s42235-022-00185-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1146624753", 
              "https://doi.org/10.1007/s42235-022-00185-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12065-021-00590-1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1136555554", 
              "https://doi.org/10.1007/s12065-021-00590-1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s12652-019-01387-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1117994730", 
              "https://doi.org/10.1007/s12652-019-01387-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00366-021-01369-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1136259534", 
              "https://doi.org/10.1007/s00366-021-01369-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10586-018-2365-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101519216", 
              "https://doi.org/10.1007/s10586-018-2365-y"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s13369-020-04476-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1126012394", 
              "https://doi.org/10.1007/s13369-020-04476-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10586-021-03304-5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1138482243", 
              "https://doi.org/10.1007/s10586-021-03304-5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s11831-021-09624-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1139420680", 
              "https://doi.org/10.1007/s11831-021-09624-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-92639-1_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1104468615", 
              "https://doi.org/10.1007/978-3-319-92639-1_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10922-021-09599-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1136929485", 
              "https://doi.org/10.1007/s10922-021-09599-4"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2022-08-06", 
        "datePublishedReg": "2022-08-06", 
        "description": "The Internet of Things (IoT) is an emerging network that has experienced a lot of progress due to extensive developments and development in this network. Due to the increased number of IoT devices, it is endangered by a botnet-type attack. Many intrusion detection systems do not have the necessary and sufficient ability to detect and prevent such attacks. Intrusion detection systems (IDSs) have provided various promising solutions to discover malicious patterns and deal with botnet attacks. Many researchers have studied the effect of reducing the number of features of datasets on the detection performance of IoT attacks. Selecting several features from a dataset is a data mining technique effectively integrated into botnet detection and identification systems design. This paper presents a new botnet detection system to detect botnets in IoT using the feature selection technique based on the slime mold algorithm (SMA) and salp swarm algorithm (SSA). On the other hand, the number of features and the importance of features selected from the dataset can directly impact the detection error rate. Therefore, we have presented a new practical and efficient multi-objective algorithm for detecting botnets based on feature selection. To maximize the performance of the proposed algorithm, we have used chaos theory. In addition, we have integrated the mechanism of the Disruption operator with the proposed algorithm. An excellent balance is created in the components of exploration and exploitation. Finally, to check and evaluate the proposed algorithm, the standard datasets available in the UCI source, created based on the real traffic of infected devices on the IoT botnet, have been used. The results obtained from the proposed algorithm indicate a significant and good performance. The results show that it has a high ability to detect botnets in IoT networks and has been able to achieve an excellent low error rate.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s00354-022-00188-w", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1053619", 
            "issn": [
              "0288-3635", 
              "1882-7055"
            ], 
            "name": "New Generation Computing", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "40"
          }
        ], 
        "keywords": [
          "intrusion detection system", 
          "botnet detection", 
          "salp swarm algorithm", 
          "detection system", 
          "number of features", 
          "slime mould algorithm", 
          "botnet detection system", 
          "Internet of Things", 
          "data mining techniques", 
          "feature selection techniques", 
          "multi-objective algorithm", 
          "importance of features", 
          "multi-objective optimization algorithm", 
          "error rate", 
          "detection error rate", 
          "hybrid multi-objective optimization algorithm", 
          "low error rate", 
          "IoT attacks", 
          "botnet attacks", 
          "malicious patterns", 
          "IoT networks", 
          "IoT devices", 
          "IoT botnets", 
          "mining techniques", 
          "such attacks", 
          "standard datasets", 
          "feature selection", 
          "botnets", 
          "selection techniques", 
          "swarm algorithm", 
          "real traffic", 
          "system design", 
          "algorithm", 
          "optimization algorithm", 
          "detection performance", 
          "promising solution", 
          "IoT", 
          "dataset", 
          "disruption operator", 
          "network", 
          "better performance", 
          "attacks", 
          "chaos theory", 
          "Internet", 
          "performance", 
          "features", 
          "traffic", 
          "system", 
          "sufficient ability", 
          "detection", 
          "things", 
          "devices", 
          "technique", 
          "excellent balance", 
          "operators", 
          "number", 
          "researchers", 
          "design", 
          "exploitation", 
          "exploration", 
          "selection", 
          "extensive development", 
          "solution", 
          "development", 
          "results", 
          "ability", 
          "theory", 
          "hand", 
          "components", 
          "progress", 
          "high ability", 
          "source", 
          "patterns", 
          "importance", 
          "addition", 
          "mechanism", 
          "rate", 
          "balance", 
          "effect", 
          "paper"
        ], 
        "name": "A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm", 
        "pagination": "809-843", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1150047736"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s00354-022-00188-w"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s00354-022-00188-w", 
          "https://app.dimensions.ai/details/publication/pub.1150047736"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:44", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_925.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s00354-022-00188-w"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s00354-022-00188-w'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s00354-022-00188-w'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s00354-022-00188-w'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s00354-022-00188-w'


     

    This table displays all metadata directly associated to this object as RDF triples.

    223 TRIPLES      21 PREDICATES      122 URIs      96 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s00354-022-00188-w schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N330080d94f3544319759b922a4fd7273
    4 schema:citation sg:pub.10.1007/978-0-85729-652-8_1
    5 sg:pub.10.1007/978-3-319-92639-1_30
    6 sg:pub.10.1007/978-981-32-9990-0_10
    7 sg:pub.10.1007/s00366-021-01369-9
    8 sg:pub.10.1007/s00521-010-0432-2
    9 sg:pub.10.1007/s10462-019-09733-4
    10 sg:pub.10.1007/s10489-018-1158-6
    11 sg:pub.10.1007/s10586-018-2365-y
    12 sg:pub.10.1007/s10586-018-2609-x
    13 sg:pub.10.1007/s10586-021-03304-5
    14 sg:pub.10.1007/s10922-021-09599-4
    15 sg:pub.10.1007/s10922-022-09653-9
    16 sg:pub.10.1007/s11831-021-09624-4
    17 sg:pub.10.1007/s12065-021-00590-1
    18 sg:pub.10.1007/s12652-019-01387-y
    19 sg:pub.10.1007/s13369-020-04476-9
    20 sg:pub.10.1007/s42235-022-00185-1
    21 sg:pub.10.1007/s42235-022-00207-y
    22 schema:datePublished 2022-08-06
    23 schema:datePublishedReg 2022-08-06
    24 schema:description The Internet of Things (IoT) is an emerging network that has experienced a lot of progress due to extensive developments and development in this network. Due to the increased number of IoT devices, it is endangered by a botnet-type attack. Many intrusion detection systems do not have the necessary and sufficient ability to detect and prevent such attacks. Intrusion detection systems (IDSs) have provided various promising solutions to discover malicious patterns and deal with botnet attacks. Many researchers have studied the effect of reducing the number of features of datasets on the detection performance of IoT attacks. Selecting several features from a dataset is a data mining technique effectively integrated into botnet detection and identification systems design. This paper presents a new botnet detection system to detect botnets in IoT using the feature selection technique based on the slime mold algorithm (SMA) and salp swarm algorithm (SSA). On the other hand, the number of features and the importance of features selected from the dataset can directly impact the detection error rate. Therefore, we have presented a new practical and efficient multi-objective algorithm for detecting botnets based on feature selection. To maximize the performance of the proposed algorithm, we have used chaos theory. In addition, we have integrated the mechanism of the Disruption operator with the proposed algorithm. An excellent balance is created in the components of exploration and exploitation. Finally, to check and evaluate the proposed algorithm, the standard datasets available in the UCI source, created based on the real traffic of infected devices on the IoT botnet, have been used. The results obtained from the proposed algorithm indicate a significant and good performance. The results show that it has a high ability to detect botnets in IoT networks and has been able to achieve an excellent low error rate.
    25 schema:genre article
    26 schema:isAccessibleForFree false
    27 schema:isPartOf N29a66680d3c34bfdb50c9445b79c2416
    28 N41572a0d4fc84c5ab8617bc8ca9b45cd
    29 sg:journal.1053619
    30 schema:keywords Internet
    31 Internet of Things
    32 IoT
    33 IoT attacks
    34 IoT botnets
    35 IoT devices
    36 IoT networks
    37 ability
    38 addition
    39 algorithm
    40 attacks
    41 balance
    42 better performance
    43 botnet attacks
    44 botnet detection
    45 botnet detection system
    46 botnets
    47 chaos theory
    48 components
    49 data mining techniques
    50 dataset
    51 design
    52 detection
    53 detection error rate
    54 detection performance
    55 detection system
    56 development
    57 devices
    58 disruption operator
    59 effect
    60 error rate
    61 excellent balance
    62 exploitation
    63 exploration
    64 extensive development
    65 feature selection
    66 feature selection techniques
    67 features
    68 hand
    69 high ability
    70 hybrid multi-objective optimization algorithm
    71 importance
    72 importance of features
    73 intrusion detection system
    74 low error rate
    75 malicious patterns
    76 mechanism
    77 mining techniques
    78 multi-objective algorithm
    79 multi-objective optimization algorithm
    80 network
    81 number
    82 number of features
    83 operators
    84 optimization algorithm
    85 paper
    86 patterns
    87 performance
    88 progress
    89 promising solution
    90 rate
    91 real traffic
    92 researchers
    93 results
    94 salp swarm algorithm
    95 selection
    96 selection techniques
    97 slime mould algorithm
    98 solution
    99 source
    100 standard datasets
    101 such attacks
    102 sufficient ability
    103 swarm algorithm
    104 system
    105 system design
    106 technique
    107 theory
    108 things
    109 traffic
    110 schema:name A Botnet Detection in IoT Using a Hybrid Multi-objective Optimization Algorithm
    111 schema:pagination 809-843
    112 schema:productId N423011678e38476ea104c6c6b017c4bc
    113 N6fa3e9edf8c645d9ae35c2f2c9a27783
    114 schema:sameAs https://app.dimensions.ai/details/publication/pub.1150047736
    115 https://doi.org/10.1007/s00354-022-00188-w
    116 schema:sdDatePublished 2022-12-01T06:44
    117 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    118 schema:sdPublisher N3cb1395ea2cd4c7b8654813a6e851358
    119 schema:url https://doi.org/10.1007/s00354-022-00188-w
    120 sgo:license sg:explorer/license/
    121 sgo:sdDataset articles
    122 rdf:type schema:ScholarlyArticle
    123 N29130af72db34c18aaf2d9e1b0e78c1d rdf:first sg:person.016340661571.42
    124 rdf:rest Nf8075f59c84a486f8e07c27ed774ae7f
    125 N29a66680d3c34bfdb50c9445b79c2416 schema:volumeNumber 40
    126 rdf:type schema:PublicationVolume
    127 N330080d94f3544319759b922a4fd7273 rdf:first sg:person.015542671622.07
    128 rdf:rest N29130af72db34c18aaf2d9e1b0e78c1d
    129 N3cb1395ea2cd4c7b8654813a6e851358 schema:name Springer Nature - SN SciGraph project
    130 rdf:type schema:Organization
    131 N41572a0d4fc84c5ab8617bc8ca9b45cd schema:issueNumber 3
    132 rdf:type schema:PublicationIssue
    133 N423011678e38476ea104c6c6b017c4bc schema:name dimensions_id
    134 schema:value pub.1150047736
    135 rdf:type schema:PropertyValue
    136 N6fa3e9edf8c645d9ae35c2f2c9a27783 schema:name doi
    137 schema:value 10.1007/s00354-022-00188-w
    138 rdf:type schema:PropertyValue
    139 Nf8075f59c84a486f8e07c27ed774ae7f rdf:first sg:person.015400364315.00
    140 rdf:rest rdf:nil
    141 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    142 schema:name Information and Computing Sciences
    143 rdf:type schema:DefinedTerm
    144 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    145 schema:name Artificial Intelligence and Image Processing
    146 rdf:type schema:DefinedTerm
    147 sg:journal.1053619 schema:issn 0288-3635
    148 1882-7055
    149 schema:name New Generation Computing
    150 schema:publisher Springer Nature
    151 rdf:type schema:Periodical
    152 sg:person.015400364315.00 schema:affiliation grid-institutes:grid.466826.8
    153 schema:familyName Masdari
    154 schema:givenName Mohammad
    155 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015400364315.00
    156 rdf:type schema:Person
    157 sg:person.015542671622.07 schema:affiliation grid-institutes:grid.466826.8
    158 schema:familyName Hosseini
    159 schema:givenName Fatemeh
    160 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015542671622.07
    161 rdf:type schema:Person
    162 sg:person.016340661571.42 schema:affiliation grid-institutes:grid.466826.8
    163 schema:familyName Gharehchopogh
    164 schema:givenName Farhad Soleimanian
    165 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016340661571.42
    166 rdf:type schema:Person
    167 sg:pub.10.1007/978-0-85729-652-8_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040277102
    168 https://doi.org/10.1007/978-0-85729-652-8_1
    169 rdf:type schema:CreativeWork
    170 sg:pub.10.1007/978-3-319-92639-1_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1104468615
    171 https://doi.org/10.1007/978-3-319-92639-1_30
    172 rdf:type schema:CreativeWork
    173 sg:pub.10.1007/978-981-32-9990-0_10 schema:sameAs https://app.dimensions.ai/details/publication/pub.1122484171
    174 https://doi.org/10.1007/978-981-32-9990-0_10
    175 rdf:type schema:CreativeWork
    176 sg:pub.10.1007/s00366-021-01369-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1136259534
    177 https://doi.org/10.1007/s00366-021-01369-9
    178 rdf:type schema:CreativeWork
    179 sg:pub.10.1007/s00521-010-0432-2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035294720
    180 https://doi.org/10.1007/s00521-010-0432-2
    181 rdf:type schema:CreativeWork
    182 sg:pub.10.1007/s10462-019-09733-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1117804434
    183 https://doi.org/10.1007/s10462-019-09733-4
    184 rdf:type schema:CreativeWork
    185 sg:pub.10.1007/s10489-018-1158-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101370562
    186 https://doi.org/10.1007/s10489-018-1158-6
    187 rdf:type schema:CreativeWork
    188 sg:pub.10.1007/s10586-018-2365-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1101519216
    189 https://doi.org/10.1007/s10586-018-2365-y
    190 rdf:type schema:CreativeWork
    191 sg:pub.10.1007/s10586-018-2609-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1101820831
    192 https://doi.org/10.1007/s10586-018-2609-x
    193 rdf:type schema:CreativeWork
    194 sg:pub.10.1007/s10586-021-03304-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1138482243
    195 https://doi.org/10.1007/s10586-021-03304-5
    196 rdf:type schema:CreativeWork
    197 sg:pub.10.1007/s10922-021-09599-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1136929485
    198 https://doi.org/10.1007/s10922-021-09599-4
    199 rdf:type schema:CreativeWork
    200 sg:pub.10.1007/s10922-022-09653-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1146415303
    201 https://doi.org/10.1007/s10922-022-09653-9
    202 rdf:type schema:CreativeWork
    203 sg:pub.10.1007/s11831-021-09624-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1139420680
    204 https://doi.org/10.1007/s11831-021-09624-4
    205 rdf:type schema:CreativeWork
    206 sg:pub.10.1007/s12065-021-00590-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1136555554
    207 https://doi.org/10.1007/s12065-021-00590-1
    208 rdf:type schema:CreativeWork
    209 sg:pub.10.1007/s12652-019-01387-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1117994730
    210 https://doi.org/10.1007/s12652-019-01387-y
    211 rdf:type schema:CreativeWork
    212 sg:pub.10.1007/s13369-020-04476-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1126012394
    213 https://doi.org/10.1007/s13369-020-04476-9
    214 rdf:type schema:CreativeWork
    215 sg:pub.10.1007/s42235-022-00185-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1146624753
    216 https://doi.org/10.1007/s42235-022-00185-1
    217 rdf:type schema:CreativeWork
    218 sg:pub.10.1007/s42235-022-00207-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1149155543
    219 https://doi.org/10.1007/s42235-022-00207-y
    220 rdf:type schema:CreativeWork
    221 grid-institutes:grid.466826.8 schema:alternateName Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran
    222 schema:name Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran
    223 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...