Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Ensemble Deep Learning Based Air Pollution Prediction for Sustainable Smart Cities

    Maha Farouk Sabir1, Mahmoud Ragab2,3,*, Adil O. Khadidos2, Khaled H. Alyoubi1, Alaa O. Khadidos1,4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 627-643, 2024, DOI:10.32604/csse.2023.041551 - 20 May 2024

    Abstract Big data and information and communication technologies can be important to the effectiveness of smart cities. Based on the maximal attention on smart city sustainability, developing data-driven smart cities is newly obtained attention as a vital technology for addressing sustainability problems. Real-time monitoring of pollution allows local authorities to analyze the present traffic condition of cities and make decisions. Relating to air pollution occurs a main environmental problem in smart city environments. The effect of the deep learning (DL) approach quickly increased and penetrated almost every domain, comprising air pollution forecast. Therefore, this article develops… More >

  • Open Access

    ARTICLE

    Coot Optimization with Deep Learning-Based False Data Injection Attack Recognition

    T. Satyanarayana Murthy1, P. Udayakumar2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 255-271, 2023, DOI:10.32604/csse.2023.034193 - 20 January 2023

    Abstract The recent developments in smart cities pose major security issues for the Internet of Things (IoT) devices. These security issues directly result from inappropriate security management protocols and their implementation by IoT gadget developers. Cyber-attackers take advantage of such gadgets’ vulnerabilities through various attacks such as injection and Distributed Denial of Service (DDoS) attacks. In this background, Intrusion Detection (ID) is the only way to identify the attacks and mitigate their damage. The recent advancements in Machine Learning (ML) and Deep Learning (DL) models are useful in effectively classifying cyber-attacks. The current research paper introduces… More >

Displaying 1-10 on page 1 of 2. Per Page