Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    Enhanced Coyote Optimization with Deep Learning Based Cloud-Intrusion Detection System

    Abdullah M. Basahel1, Mohammad Yamin1, Sulafah M. Basahel2, E. Laxmi Lydia3,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4319-4336, 2023, DOI:10.32604/cmc.2023.033497 - 31 October 2022

    Abstract Cloud Computing (CC) is the preference of all information technology (IT) organizations as it offers pay-per-use based and flexible services to its users. But the privacy and security become the main hindrances in its achievement due to distributed and open architecture that is prone to intruders. Intrusion Detection System (IDS) refers to one of the commonly utilized system for detecting attacks on cloud. IDS proves to be an effective and promising technique, that identifies malicious activities and known threats by observing traffic data in computers, and warnings are given when such threats were identified. The… More >

  • Open Access

    ARTICLE

    Fuzzy Hybrid Coyote Optimization Algorithm for Image Thresholding

    Linguo Li1,2, Xuwen Huang2, Shunqiang Qian2, Zhangfei Li2, Shujing Li2,*, Romany F. Mansour3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3073-3090, 2022, DOI:10.32604/cmc.2022.026625 - 29 March 2022

    Abstract In order to address the problems of Coyote Optimization Algorithm in image thresholding, such as easily falling into local optimum, and slow convergence speed, a Fuzzy Hybrid Coyote Optimization Algorithm (hereinafter referred to as FHCOA) based on chaotic initialization and reverse learning strategy is proposed, and its effect on image thresholding is verified. Through chaotic initialization, the random number initialization mode in the standard coyote optimization algorithm (COA) is replaced by chaotic sequence. Such sequence is nonlinear and long-term unpredictable, these characteristics can effectively improve the diversity of the population in the optimization algorithm. Therefore,… More >

Displaying 1-10 on page 1 of 3. Per Page