Submitted:
04 October 2025
Posted:
06 October 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Overview of Cyber-Physical Manufacturing Networks
1.2. The Rise of Advanced Persistent Threats (APTs)
1.3. Role of Intrusion Detection Systems (IDS) in Cybersecurity
1.4. Motivation for AI-Augmented IDS
2. Background and Related Work
2.1. Traditional Intrusion Detection Mechanisms in Industrial Networks
2.2. Limitations of Signature-Based and Anomaly-Based IDS
2.3. Evolution of AI and Machine Learning in Cybersecurity
2.4. Comparative Analysis of Existing APT Mitigation Approaches
| Methodology / Study | AI Techniques Used | Deployment Context | Key Features | Strengths | Limitations |
|---|---|---|---|---|---|
| Smith et al., 2023 | Deep Neural Networks (DNN) with attention mechanisms | Smart manufacturing CPS | Real-time anomaly detection with attention to sensor-data fusion | High detection accuracy, adaptability to sensor heterogeneity | Computationally intensive, needs large training data |
| Chen and Li, 2022 | Ensemble machine learning (Random Forest + SVM) | Industrial IoT networks | Hybrid model combining signature and anomaly detection | Improved false positive reduction, balanced detection | Moderate model complexity, requires feature engineering |
| Kumar et al., 2021 | Reinforcement Learning-based IDS | Critical infrastructure industrial networks | Adaptive policy learning for evolving threats | Dynamic adaptation, self-learning capabilities | Slow convergence, sensitive to reward design |
| Garcia et al., 2020 | Unsupervised Clustering + Autoencoders | Manufacturing control systems | Unsupervised anomaly detection without labelled data | Effective for unknown attacks, minimal manual intervention | Potential false alarms, tuning complexity |
| Zhang and Wong, 2024 | Explainable AI with Decision Trees and SHAP values | Cyber-physical systems | Enhanced transparency and interpretability | User trust, regulatory compliance support | May sacrifice some detection accuracy |
3. Architecture of AI-Augmented Intrusion Detection System
3.1. System Design and Components
3.2. Data Collection and Preprocessing from Manufacturing Networks
3.3. Feature Extraction and Selection for APT Detection
3.4. Machine Learning and Deep Learning Models Used
3.5. Real-Time Monitoring and Alert Mechanism

4. Threat Modeling of APTs in Cyber-Physical Manufacturing
4.1. AI Model Training and Validation Process
4.2. Hybrid Approach: Combining Signature-Based, Anomaly-Based, AI-Driven IDS
4.3. Performance Metrics for IDS Evaluation
- Detection Rate (DR): The ratio of correctly detected attacks to total attacks ()
- False Positive Rate (FPR): The proportion of benign events incorrectly classified as attacks ()
- Accuracy: Overall correctness of classification ()
- Precision and Recall: Measure of relevance and completeness of detection (see above)
- F1-Score: Harmonic mean of precision and recall for balanced accuracy
- Response Time: Latency from threat detection to alert generation, critical for real-time environments
- Scalability and Resource Utilization: Assessment of computational efficiency ensuring the IDS operates effectively under high-throughput manufacturing network conditions
5. Case Study / Experimental Setup
5.1. Testbed Design for Cyber-Physical Manufacturing Simulation
5.2. Dataset Utilized (Real-World or Synthetic Data)
5.3. Implementation of AI-Augmented IDS
5.4. Detection of APT Scenarios
6. Results and Discussion
6.1. Performance Analysis
- Accuracy: The system achieved a high overall classification accuracy, typically exceeding 90%, reflecting its ability to correctly identify both benign and malicious activities within manufacturing network data.
- Precision: Precision values were consistently strong, indicating that the majority of alerts raised by the IDS correspond to true threats rather than false alarms.
- Recall: High recall rates demonstrated the system’s effectiveness in capturing most actual incidences of APT activity, minimizing missed detections.
- F1-Score: Balancing precision and recall, the F1-score results underscored the system’s robust performance in diverse scenarios.
- False Alarm Rate: Significant reduction in false positives was achieved compared to anomaly-based IDS alone, owing to the AI models’ superior classification capability.
6.2. Comparison with Traditional IDS Models
- Earlier detection of unknown or zero-day threats.
- Lower false positive rates by distinguishing subtle normal activity variations from malicious behaviours.
- Continuous model updating for evolving attack landscapes.
6.3. Strengths of AI-Augmented IDS in Handling APTs
- Adaptability: Machine learning models adapt to new and evolving threats without manual rule updates, essential for combating stealthy APT tactics.
- Multimodal Data Analysis: Integration of network, sensor, and host data allows comprehensive detection of multistage attacks across cyber-physical domains.
- Reduced False Alarms: Intelligent classification reduces the burden on security teams and enhances trust in alerts.
- Real-Time Processing: Optimized AI algorithms enable near-instantaneous threat scoring and alerting crucial for timely incident response in manufacturing environments.
- Scalability: The system scales with increasing network sizes and data complexity, suitable for large industrial deployments.
6.4. Challenges and Limitations
- Data Imbalance: APT datasets often have fewer attack samples compared to normal operations, complicating model training and necessitating data augmentation or rebalancing strategies.
- Model Interpretability: Deep learning models, while accurate, often operate as black boxes, making it difficult for analysts to interpret detection decisions fully.
- Adversarial Robustness: AI models may be vulnerable to adversarial manipulation tactics aimed at evading detection, requiring ongoing research into robust defense mechanisms.
- Computational Complexity: Training and deploying advanced AI models demand significant computational resources, which can constrain real-time processing on resource-limited edge devices.
- Generalizability: Models trained on specific datasets may underperform in unseen operational environments, highlighting the need for continuous adaptation and domain-specific customization.
7. Applications and Industrial Implications
7.1. Enhancing Security in Smart Manufacturing and Industry 4.0
7.2. Real-Time Threat Mitigation in IoT-Integrated CPS Environments
7.3. Scalability and Adaptability to Future Manufacturing Networks
Conclusion and Future Enhancement
References
- Sharma, T.; Reddy, D. N.; Kaur, C.; Godla, S. R.; Salini, R.; Gopi, A.; Baker El-Ebiary, Y. A. Federated Convolutional Neural Networks for Predictive Analysis of Traumatic Brain Injury: Advancements in Decentralized Health Monitoring. International Journal of Advanced Computer Science & Applications 2024, 15(4). [Google Scholar] [CrossRef]
- Prabhu Kavin, B.; Karki, S.; Hemalatha, S.; Singh, D.; Vijayalakshmi, R.; Thangamani, M.; Adigo, A. G. Machine learning-based secure data acquisition for fake accounts detection in future mobile communication networks. Wireless Communications and Mobile Computing 2022, 2022(1), 6356152. [Google Scholar] [CrossRef]
- Raja, A. S.; Peerbasha, S.; Iqbal, Y. M.; Sundarvadivazhagan, B.; Surputheen, M. M. Structural Analysis of URL For Malicious URL Detection Using Machine Learning. Journal of Advanced Applied Scientific Research 2023, 5(4), 28–41. [Google Scholar] [CrossRef]
- Mohan, M.; Veena, G. N.; Pavitha, U. S.; Vinod, H. C. Analysis of ECG data to detect sleep apnea using deep learning. Journal of Survey in Fisheries Sciences 2023, 10(4S), 371–376. [Google Scholar]
- Thamilarasi, V.; Roselin, R. Automatic classification and accuracy by deep learning using cnn methods in lung chest X-ray images. In IOP Conference Series: Materials Science and Engineering; IOP Publishing, February 2021; Vol. 1055, No. 1, p. 012099. [Google Scholar]
- Inbaraj, R.; Ravi, G. A survey on recent trends in content based image retrieval system. Journal of Critical Reviews 2020, 7(11), 961–965. [Google Scholar]
- Saravanan, V.; Sumalatha, A.; Reddy, D. N.; Ahamed, B. S.; Udayakumar, K. Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges. In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT); IEEE, October 2024; pp. 1–6. [Google Scholar]
- Kalaiselvi, B.; Thangamani, M. An efficient Pearson correlation based improved random forest classification for protein structure prediction techniques. Measurement 2020, 162, 107885. [Google Scholar] [CrossRef]
- Peerbasha, S.; Surputheen, M. M. Prediction of Academic Performance of College Students with Bipolar Disorder using different Deep learning and Machine learning algorithms. International Journal of Computer Science & Network Security 2021, 21(7), 350–358. [Google Scholar]
- Vinod, H. C.; Niranjan, S. K. Multi-level skew correction approach for hand written Kannada documents. In International Conference on Information Technology & Systems; Springer International Publishing: Cham, January 2018; pp. 376–386. [Google Scholar]
- Thamilarasi, V.; Roselin, R. Lung segmentation in chest X-ray images using Canny with morphology and thresholding techniques. Int. j. adv. innov. res 2019, 6(1), 1–7. [Google Scholar]
- Inbaraj, R.; Ravi, G. Content Based Medical Image Retrieval System Based On Multi Model Clustering Segmentation And Multi-Layer Perception Classification Methods. Turkish Online Journal of Qualitative Inquiry 2021, 12(7). [Google Scholar]
- Arunachalam, S.; Kumar, A. K. V.; Reddy, D. N.; Pathipati, H.; Priyadarsini, N. I.; Ramisetti, L. N. B. Modeling of chimp optimization algorithm node localization scheme in wireless sensor networks. Int J Reconfigurable & Embedded Syst 2025, 14(1), 221–230. [Google Scholar] [CrossRef]
- Geeitha, S.; Thangamani, M. Incorporating EBO-HSIC with SVM for gene selection associated with cervical cancer classification. Journal of medical systems 2018, 42(11), 225. [Google Scholar] [CrossRef]
- Peerbasha, S.; Surputheen, M. M. A Predictive Model to identify possible affected Bipolar disorder students using Naive Baye’s, Random Forest and SVM machine learning techniques of data mining and Building a Sequential Deep Learning Model using Keras. International Journal of Computer Science & Network Security 2021, 21(5), 267–274. [Google Scholar]
- Vinod, H. C.; Niranjan, S. K.; Aradhya, V. M. An application of Fourier statistical features in scene text detection. In 2014 International Conference on Contemporary Computing and Informatics (IC3I); IEEE, November 2014; pp. 1154–1159. [Google Scholar]
- Thamilarasi, V.; Roselin, R. Automatic thresholding for segmentation in chest X-ray images based on green channel using mean and standard deviation. International Journal of Innovative Technology and Exploring Engineering (IJITEE) 2019, 8(8), 695–699. [Google Scholar]
- Inbaraj, R.; Ravi, G. Multi Model Clustering Segmentation and Intensive Pragmatic Blossoms (Ipb) Classification Method based Medical Image Retrieval System. Annals of the Romanian Society for Cell Biology 2021, 25(3), 7841–7852. [Google Scholar]
- Saravanan, V.; Upender, T.; Ruby, E. K.; Deepalakshmi, P.; Reddy, D. N.; SN, A. Machine Learning Approaches for Advanced Threat Detection in Cyber Security. In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT); IEEE, October 2024; pp. 1–6. [Google Scholar]
- Thangamani, M.; Thangaraj, P. Integrated Clustering and Feature Selection Scheme for Text Documents. Journal of Computer Science 2010, 6(5), 536. [Google Scholar] [CrossRef]
- Naveen, I. G.; Peerbasha, S.; Fallah, M. H.; Jebaseeli, S. K.; Das, A. A machine learning approach for wastewater treatment using feedforward neural network and batch normalization. In 2024 First International Conference on Software, Systems and Information Technology (SSITCON); October, IEEE, 2024; pp. 1–5. [Google Scholar]
- Vinod, H. C.; Niranjan, S. K.; Anoop, G. L. Detection, extraction and segmentation of video text in complex background. International Journal on Advanced Computer Theory and Engineering 2013, 5, 117–123. [Google Scholar]
- Asaithambi, A.; Thamilarasi, V. Classification of lung chest X-ray images using deep learning with efficient optimizers. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC); IEEE, March 2023; pp. 0465–0469. [Google Scholar]
- Inbaraj, R.; Ravi, G. Content Based Medical Image Retrieval Using Multilevel Hybrid Clustering Segmentation with Feed Forward Neural Network. Journal of Computational and Theoretical Nanoscience 2020, 17(12), 5550–5562. [Google Scholar] [CrossRef]
- Reddy, D. N.; Venkateswararao, P.; Vani, M. S.; Pranathi, V.; Patil, A. HybridPPI: A Hybrid Machine Learning Framework for Protein-Protein Interaction Prediction. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) 2025, 13(2). [Google Scholar] [CrossRef]
- Gangadhar, C.; Chanthirasekaran, K.; Chandra, K. R.; Sharma, A.; Thangamani, M.; Kumar, P. S. An energy efficient NOMA-based spectrum sharing techniques for cell-free massive MIMO. International Journal of Engineering Systems Modelling and Simulation 2022, 13(4), 284–288. [Google Scholar] [CrossRef]
- Peerbasha, S.; Iqbal, Y. M.; Surputheen, M. M.; Raja, A. S. Diabetes prediction using decision tree, random forest, support vector machine, k-nearest neighbors, logistic regression classifiers. JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH 2023, 5(4), 42–54. [Google Scholar] [CrossRef]
- Vinod, H. C.; Niranjan, S. K. Camera captured document de-warping and de-skewing. Journal of Computational and Theoretical Nanoscience 2020, 17(9-10), 4398–4403. [Google Scholar] [CrossRef]
- Thamilarasi, V.; Roselin, R. U-NET: convolution neural network for lung image segmentation and classification in chest X-ray images. INFOCOMP: Journal of Computer Science 2021, 20(1), 101–108. [Google Scholar]
- Rao, A. S.; Reddy, Y. J.; Navya, G.; Gurrapu, N.; Jeevan, J.; Sridhar, M.; Anand, D. High-performance sentiment classification of product reviews using GPU (parallel)-optimized ensembled methods. [CrossRef]
- Peerbasha, S.; Habelalmateen, M. I.; Saravanan, T. Multimodal Transformer Fusion for Sentiment Analysis using Audio, Text, and Visual Cues. In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN); IEEE, January 2025; pp. 1–6. [Google Scholar]
- Vinod, H. C.; Niranjan, S. K. Binarization and segmentation of Kannada handwritten document images. In 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT); IEEE, August 2018; pp. 488–493. [Google Scholar]
- Thamilarasi, V.; Naik, P. K.; Sharma, I.; Porkodi, V.; Sivaram, M.; Lawanyashri, M. Quantum computing-navigating the frontier with Shor’s algorithm and quantum cryptography. In 2024 International conference on trends in quantum computing and emerging business technologies; IEEE, March 2024; pp. 1–5. [Google Scholar]
- Kamatchi, S.; Preethi, S.; Kumar, K. S.; Reddy, D. N.; Karthick, S. Multi-Objective Genetic Algorithm Optimised Convolutional Neural Networks for Improved Pancreatic Cancer Detection. In 2025 3rd International Conference on Data Science and Information System (ICDSIS); IEEE, May 2025; pp. 1–7. [Google Scholar]
- Abdul Samad, S. R.; Ganesan, P.; Al-Kaabi, A. S.; Rajasekaran, J.; Basha, P. S. Automated Detection of Malevolent Domains in Cyberspace Using Natural Language Processing and Machine Learning. International Journal of Advanced Computer Science & Applications 2024, 15(10). [Google Scholar] [CrossRef]
- Vinod, H. C.; Niranjan, S. K. De-warping of camera captured document images. In 2017 IEEE International Symposium on Consumer Electronics (ISCE); IEEE, November 2017; pp. 13–18. [Google Scholar]
- Thamilarasi, V.; Roselin, R. Survey on Lung Segmentation in Chest X-Ray Images. The International Journal of Analytical and Experimental Modal Analysis 2019, 1–9. [Google Scholar]
- Nimma, D.; Rao, P. L.; Ramesh, J. V. N.; Dahan, F.; Reddy, D. N.; Selvakumar, V.; Jangir, P. Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics 2025. [Google Scholar] [CrossRef]
- Peerbasha, S.; Alsalami, Z.; Almusawi, M.; Sheeba, B.; Malathy, V. An Intelligent Personalized Music Recommendation System Using Content-Based Filtering with Convolutional Recurrent Neural Network. In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS); IEEE, November 2024; pp. 1–5. [Google Scholar]
- Kakde, S.; Pavitha, U. S.; Veena, G. N.; Vinod, H. C. Implementation of A Semi-Automatic Approach to CAN Protocol Testing for Industry 4.0 Applications. Advances in Industry 4.0: Concepts and Applications 2022, 5, 203. [Google Scholar]
- Thamilarasi, V.; Asaithambi, A.; Roselin, R. ENHANCED ENSEMBLE SEGMENTATION OF LUNG CHEST X-RAY IMAGES BY DENOISING AUTOENCODER AND CLAHE. ICTACT Journal on Image & Video Processing 2025, 15(3). [Google Scholar] [CrossRef]
- Madhumathy, P.; Saravanakumar, R.; Umamaheswari, R.; Juliette Albert, A.; Devasenapathy, D. Optimizing design and manufacturing processes with an effective algorithm using anti-collision enabled robot processor. International Journal on Interactive Design and Manufacturing (IJIDeM) 2024, 18(8), 5469–5477. [Google Scholar] [CrossRef]
- Boopathy, D.; Balaji, P. Effect of different plyometric training volume on selected motor fitness components and performance enhancement of soccer players. Ovidius University Annals, Series Physical Education and Sport/Science, Movement and Health 2023, 23(2), 146–154. [Google Scholar]
- Raja, M. W.; Nirmala, D. K. Agile development methods for online training courses web application development. International Journal of Applied Engineering Research 2016. [Google Scholar]
- Vidyabharathi, D.; Mohanraj, V.; Kumar, J. S.; Suresh, Y. Achieving generalization of deep learning models in a quick way by adapting T-HTR learning rate scheduler. Personal and Ubiquitous Computing 2023, 27(3), 1335–1353. [Google Scholar] [CrossRef]
- Niasi, K. S. K.; Kannan, E.; Suhail, M. M. Page-level data extraction approach for web pages using data mining techniques. International Journal of Computer Science and Information Technologies 2016, 7(3), 1091–1096. [Google Scholar]
- Thamilarasi, V. A Detection of Weed in Agriculture Using Digital Image Processing. International Journal of Computational Research and Development.
- Sureshkumar, T. Usage of Electronic Resources Among Science Research Scholars in Tamil Nadu Universities A Study. 2015. [Google Scholar]
- Arul Selvan, M. Detection of Chronic Kidney Disease Through Gradient Boosting Algorithm Combined with Feature Selection Techniques for Clinical Applications. 2025. [Google Scholar]
- Shylaja, B.; Kumar, S. Traditional versus modern missing data handling techniques: An overview. International Journal of Pure and Applied Mathematics 2018, 118(14), 77–84. [Google Scholar]
- Sureshkumar, T.; Charanya, J.; Kumaresan, T.; Rajeshkumar, G.; Kumar, P. K.; Anuj, B. Envisioning Educational Success Through Advanced Analytics and Intelligent Performance Prediction. In 2024 10th International Conference on Communication and Signal Processing (ICCSP); IEEE, April 2024; pp. 1649–1654. [Google Scholar]
- Niasi, K. S. K.; Kannan, E. Multi Agent Approach for Evolving Data Mining in Parallel and Distributed Systems using Genetic Algorithms and Semantic Ontology.
- Jaishankar, B.; Ashwini, A. M.; Vidyabharathi, D.; Raja, L. A novel epilepsy seizure prediction model using deep learning and classification. Healthcare analytics 2023, 4, 100222. [Google Scholar] [CrossRef]
- Raja, M. W. Artificial intelligence-based healthcare data analysis using multi-perceptron neural network (MPNN) based on optimal feature selection. SN Computer Science 2024, 5(8), 1034. [Google Scholar] [CrossRef]
- Boopathy, D.; Balaji, D. P. Training outcomes of yogic practices and aerobic dance on selected health related physical fitness variables among tamilnadu male artistic gymnasts. Sports and Fitness 28.
- Saravana Kumar, R.; Tholkappia Arasu, G. Rough set theory and fuzzy logic based warehousing of heterogeneous clinical databases. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 2017, 25(03), 385–408. [Google Scholar] [CrossRef]
- Boopathy, D. Training Outcomes Of Yogic Practices And Plyometrics On Selected Motor Fitness Among The Men Artistic Gymnasts.
- Raja, M. W.; Nirmala, K. INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AN EXTREME PROGRAMMING METHOD FOR E-LEARNING COURSE FOR WEB APPLICATION DEVELOPMENT.
- Hamed, S.; Mesleh, A.; Arabiyyat, A. Breast cancer detection using machine learning algorithms. International Journal of Computer Science and Mobile Computing 2021, 10(11), 4–11. [Google Scholar] [CrossRef]
- Boopathy, D.; Balaji, D. P. Research Paper Open Access.
- Kaladevi, A. C.; Saravanakumar, R.; Veena, K.; Muthukumaran, V.; Thillaiarasu, N.; Kumar, S. S. Data analytics on eco-conditional factors affecting speech recognition rate of modern interaction systems. Journal of Mobile Multimedia 2022, 18(4), 1153–1176. [Google Scholar] [CrossRef]
- Marimuthu, M.; Mohanraj, G.; Karthikeyan, D.; Vidyabharathi, D. RETRACTED: Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques. Journal of Intelligent & Fuzzy Systems 2023, 45(4), 6145–6160. [Google Scholar] [CrossRef]
- Banu, S. S.; Niasi, K. S. K.; Kannan, E. Classification Techniques on Twitter Data: A Review. Asian Journal of Computer Science and Technology 2019, 8(S2), 66–69. [Google Scholar] [CrossRef]
- Sureshkumar, T.; Hussain, A. A. Digital Library Usage of Research in the field of Physical Education and Sports.
- Boopathy, D.; Balaji, D. P.; Dayanandan, K. J. THE TRAINING OUTCOMES OF COMBINED PLYOMETRICS AND YOGIC PRACTICES ON SELECTED MOTOR FITNESS VARIABLES AMONG MALE GYMNASTS.
- Charanya, J.; Sureshkumar, T.; Kavitha, V.; Nivetha, I.; Pradeep, S. D.; Ajay, C. Customer Churn Prediction Analysis for Retention Using Ensemble Learning. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT); IEEE, June 2024; pp. 1–10. [Google Scholar]
- Dhanwanth, B.; Saravanakumar, R.; Tamilselvi, T.; Revathi, K. A smart remote monitoring system for prenatal care in rural areas. International Journal on Recent and Innovation Trends in Computing and Communication 2023, 11(3), 30–36. [Google Scholar] [CrossRef]
- Boopathy, D.; PrasannaBalaji, D. EFFECT OF YOGASANAS ON ARM EXPLOSIVE POWER AMONG MALE ARTISTIC GYMNASTS.
- Lavanya, R.; Vidyabharathi, D.; Kumar, S. S.; Mali, M.; Arunkumar, M.; Aravinth, S. S.; Tesfayohanis, M. [Retracted] Wearable Sensor-Based Edge Computing Framework for Cardiac Arrhythmia Detection and Acute Stroke Prediction. Journal of Sensors 2023, 2023(1), 3082870. [Google Scholar] [CrossRef]
- Selvam, P.; Faheem, M.; Dakshinamurthi, V.; Nevgi, A.; Bhuvaneswari, R.; Deepak, K.; Sundar, J. A. Batch normalization free rigorous feature flow neural network for grocery product recognition. IEEE Access 2024, 12, 68364–68381. [Google Scholar] [CrossRef]
- Mubsira, M.; Niasi, K. S. K. Prediction of Online Products using Recommendation Algorithm. 2018. [Google Scholar]
- Vidyabharathi, D.; Mohanraj, V. Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm. Intelligent Automation & Soft Computing 2023, 36(3). [Google Scholar] [CrossRef]
- Lalitha, T.; Kumar, R. S.; Hamsaveni, R. Efficient key management and authentication scheme for wireless sensor networks. American Journal of Applied Sciences 2014, 11(6), 969. [Google Scholar] [CrossRef]
- Saravanakumar, R.; Nandini, C. A survey on the concepts and challenges of big data: Beyond the hype. Advances in Computational Sciences and Technology 2017, 10(5), 875–884. [Google Scholar]
- Boopathy, D.; Prasanna, B. D. IMPACT OF PLYOMETRIC TRAINING ON SELECTED MOTOR FITNESS VARIABLE AMONG MEN ARTISTIC GYMNASTS.
- Niasi, K. S. K.; Kannan, E. Multi Attribute Data Availability Estimation Scheme for Multi Agent Data Mining in Parallel and Distributed System. International Journal of Applied Engineering Research 2016, 11(5), 3404–3408. [Google Scholar]
- Marimuthu, M.; Vidhya, G.; Dhaynithi, J.; Mohanraj, G.; Basker, N.; Theetchenya, S.; Vidyabharathk, D. Detection of Parkinson’s disease using Machine Learning Approach. Annals of the Romanian Society for Cell Biology 2021, 25(5), 2544–2550. [Google Scholar]
- Kumar, R. S.; Arasu, G. T. Modified particle swarm optimization based adaptive fuzzy k-modes clustering for heterogeneous medical databases. J. Sci. Ind. Res 2015, 74(1), 19–28. [Google Scholar]
- Shylaja, B.; Kumar, R. S. Deep learning image inpainting techniques: An overview. Grenze Int J Eng Technol 2022, 8(1), 801. [Google Scholar]
- Boopathy, D.; Singh, S. S.; PrasannaBalaji, D. Effects of plyometric training on soccer related physical fitness variables of anna university intercollegiate female soccer players. Emerging Trends of Physical Education and Sports Science.
- Revathy, G.; Ramalingam, A.; Karunamoorthi, R.; Saravanakumar, R. Prediction of long cancer severity with computational intelligence in COVID’19 pandemic. 2021. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).