Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    An Effective Classifier Model for Imbalanced Network Attack Data

    Gürcan Çetin*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4519-4539, 2022, DOI:10.32604/cmc.2022.031734

    Abstract Recently, machine learning algorithms have been used in the detection and classification of network attacks. The performance of the algorithms has been evaluated by using benchmark network intrusion datasets such as DARPA98, KDD’99, NSL-KDD, UNSW-NB15, and Caida DDoS. However, these datasets have two major challenges: imbalanced data and high-dimensional data. Obtaining high accuracy for all attack types in the dataset allows for high accuracy in imbalanced datasets. On the other hand, having a large number of features increases the runtime load on the algorithms. A novel model is proposed in this paper to overcome these two concerns. The number of… More >

  • Open Access

    ARTICLE

    Seeker Optimization with Deep Learning Enabled Sentiment Analysis on Social Media

    Hanan M. Alghamdi1, Saadia H.A. Hamza2, Aisha M. Mashraqi3, Sayed Abdel-Khalek4,5,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5985-5999, 2022, DOI:10.32604/cmc.2022.031732

    Abstract World Wide Web enables its users to connect among themselves through social networks, forums, review sites, and blogs and these interactions produce huge volumes of data in various forms such as emotions, sentiments, views, etc. Sentiment Analysis (SA) is a text organization approach that is applied to categorize the sentiments under distinct classes such as positive, negative, and neutral. However, Sentiment Analysis is challenging to perform due to inadequate volume of labeled data in the domain of Natural Language Processing (NLP). Social networks produce interconnected and huge data which brings complexity in terms of expanding SA to an extensive array… More >

  • Open Access

    ARTICLE

    A Novel Method for Routing Optimization in Software-Defined Networks

    Salem Alkhalaf*, Fahad Alturise

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6393-6405, 2022, DOI:10.32604/cmc.2022.031698

    Abstract Software-defined network (SDN) is a new form of network architecture that has programmability, ease of use, centralized control, and protocol independence. It has received high attention since its birth. With SDN network architecture, network management becomes more efficient, and programmable interfaces make network operations more flexible and can meet the different needs of various users. The mainstream communication protocol of SDN is OpenFlow, which contains a Match Field in the flow table structure of the protocol, which matches the content of the packet header of the data received by the switch, and completes the corresponding actions according to the matching… More >

  • Open Access

    ARTICLE

    Motion Enhanced Model Based on High-Level Spatial Features

    Yang Wu1, Lei Guo1, Xiaodong Dai1, Bin Zhang1, Dong-Won Park2, Ming Ma1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5911-5924, 2022, DOI:10.32604/cmc.2022.031664

    Abstract Action recognition has become a current research hotspot in computer vision. Compared to other deep learning methods, Two-stream convolutional network structure achieves better performance in action recognition, which divides the network into spatial and temporal streams, using video frame images as well as dense optical streams in the network, respectively, to obtain the category labels. However, the two-stream network has some drawbacks, i.e., using dense optical flow as the input of the temporal stream, which is computationally expensive and extremely time-consuming for the current extraction algorithm and cannot meet the requirements of real-time tasks. In this paper, instead of the… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    The Impact of Check Bits on the Performance of Bloom Filter

    Rehan Ullah Khan1, Ali Mustafa Qamar2,*, Suliman A. Alsuhibany2, Mohammed Alsuhaibani2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6037-6046, 2022, DOI:10.32604/cmc.2022.031626

    Abstract Bloom filter (BF) is a space-and-time efficient probabilistic technique that helps answer membership queries. However, BF faces several issues. The problems with traditional BF are generally two. Firstly, a large number of false positives can return wrong content when the data is queried. Secondly, the large size of BF is a bottleneck in the speed of querying and thus uses large memory. In order to solve the above two issues, in this article, we propose the check bits concept. From the implementation perspective, in the check bits approach, before saving the content value in the BF, we obtain the binary… More >

  • Open Access

    ARTICLE

    Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model

    Hadil Shaiba1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Radwa Marzouk4, Heba Mohsen5, Manar Ahmed Hamza6,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6425-6441, 2022, DOI:10.32604/cmc.2022.031625

    Abstract Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords, account identifiers, bank details, etc. In general, these kinds of cyberattacks are made at users through phone calls, emails, or instant messages. The anti-phishing techniques, currently under use, are mainly based on source code features that need to scrape the webpage content. In third party services, these techniques check the classification procedure of phishing Uniform Resource Locators (URLs). Even though Machine Learning (ML) techniques have been lately utilized in the identification of phishing, they still need to undergo feature engineering since… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Threat Detection in Industrial Internet of Things Environment

    Fahad F. Alruwaili*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5809-5824, 2022, DOI:10.32604/cmc.2022.031613

    Abstract Internet of Things (IoT) is one of the hottest research topics in recent years, thanks to its dynamic working mechanism that integrates physical and digital world into a single system. IoT technology, applied in industries, is termed as Industrial IoT (IIoT). IIoT has been found to be highly susceptible to attacks from adversaries, based on the difficulties observed in IIoT and its increased dependency upon internet and communication network. Intentional or accidental attacks on these approaches result in catastrophic effects like power outage, denial of vital health services, disruption to civil service, etc., Thus, there is a need exists to… More >

  • Open Access

    ARTICLE

    Two-Fold and Symmetric Repeatability Rates for Comparing Keypoint Detectors

    Ibrahim El rube'*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6495-6511, 2022, DOI:10.32604/cmc.2022.031602

    Abstract The repeatability rate is an important measure for evaluating and comparing the performance of keypoint detectors. Several repeatability rate measurements were used in the literature to assess the effectiveness of keypoint detectors. While these repeatability rates are calculated for pairs of images, the general assumption is that the reference image is often known and unchanging compared to other images in the same dataset. So, these rates are asymmetrical as they require calculations in only one direction. In addition, the image domain in which these computations take place substantially affects their values. The presented scatter diagram plots illustrate how these directional… More >

  • Open Access

    ARTICLE

    Optimization of Adaptive Fuzzy Controller for Maximum Power Point Tracking Using Whale Algorithm

    Mehrdad Ahmadi Kamarposhti1,*, Hassan Shokouhandeh2, Ilhami Colak3, Kei Eguchi4

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5041-5061, 2022, DOI:10.32604/cmc.2022.031583

    Abstract The advantage of fuzzy controllers in working with inaccurate and nonlinear inputs is that there is no need for an accurate mathematical model and fast convergence and minimal fluctuations in the maximum power point detector. The capability of online fuzzy tracking systems is maximum power, resistance to radiation and temperature changes, and no need for external sensors to measure radiation intensity and temperature. However, the most important issue is the constant changes in the amount of sunlight that cause the maximum power point to be constantly changing. The controller used in the maximum power point tracking (MPPT) circuit must be… More >

Displaying 6631-6640 on page 664 of 22098. Per Page