Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (512)
  • Open Access

    ARTICLE

    Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection

    Mohammad Al-Omari1, Qasem Abu Al-Haija2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1537-1555, 2024, DOI:10.32604/csse.2024.056257 - 22 November 2024

    Abstract More businesses are deploying powerful Intrusion Detection Systems (IDS) to secure their data and physical assets. Improved cyber-attack detection and prevention in these systems requires machine learning (ML) approaches. This paper examines a cyber-attack prediction system combining feature selection (FS) and ML. Our technique’s foundation was based on Correlation Analysis (CA), Mutual Information (MI), and recursive feature reduction with cross-validation. To optimize the IDS performance, the security features must be carefully selected from multiple-dimensional datasets, and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets. More >

  • Open Access

    ARTICLE

    Improved Double Deep Q Network Algorithm Based on Average Q-Value Estimation and Reward Redistribution for Robot Path Planning

    Yameng Yin1, Lieping Zhang2,*, Xiaoxu Shi1, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2769-2790, 2024, DOI:10.32604/cmc.2024.056791 - 18 November 2024

    Abstract By integrating deep neural networks with reinforcement learning, the Double Deep Q Network (DDQN) algorithm overcomes the limitations of Q-learning in handling continuous spaces and is widely applied in the path planning of mobile robots. However, the traditional DDQN algorithm suffers from sparse rewards and inefficient utilization of high-quality data. Targeting those problems, an improved DDQN algorithm based on average Q-value estimation and reward redistribution was proposed. First, to enhance the precision of the target Q-value, the average of multiple previously learned Q-values from the target Q network is used to replace the single Q-value… More >

  • Open Access

    ARTICLE

    Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT

    Xiaojun Jin1, Chao Ma2,*, Song Luo2, Pengyi Zeng1, Yifei Wei1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2317-2336, 2024, DOI:10.32604/cmc.2024.055344 - 18 November 2024

    Abstract Federated learning enables data owners in the Internet of Things (IoT) to collaborate in training models without sharing private data, creating new business opportunities for building a data market. However, in practical operation, there are still some problems with federated learning applications. Blockchain has the characteristics of decentralization, distribution, and security. The blockchain-enabled federated learning further improve the security and performance of model training, while also expanding the application scope of federated learning. Blockchain has natural financial attributes that help establish a federated learning data market. However, the data of federated learning tasks may be… More >

  • Open Access

    ARTICLE

    A Concise and Varied Visual Features-Based Image Captioning Model with Visual Selection

    Alaa Thobhani1,*, Beiji Zou1, Xiaoyan Kui1, Amr Abdussalam2, Muhammad Asim3, Naveed Ahmed4, Mohammed Ali Alshara4,5

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2873-2894, 2024, DOI:10.32604/cmc.2024.054841 - 18 November 2024

    Abstract Image captioning has gained increasing attention in recent years. Visual characteristics found in input images play a crucial role in generating high-quality captions. Prior studies have used visual attention mechanisms to dynamically focus on localized regions of the input image, improving the effectiveness of identifying relevant image regions at each step of caption generation. However, providing image captioning models with the capability of selecting the most relevant visual features from the input image and attending to them can significantly improve the utilization of these features. Consequently, this leads to enhanced captioning network performance. In light… More >

  • Open Access

    ARTICLE

    Using Multi-Omics Analysis to Explore Diagnostic Tool and Optimize Drug Therapy Selection for Patients with Glioma Based on Cross-Talk Gene Signature

    YUSHI YANG1,#, CHUJIAO HU2,#, SHAN LEI3, XIN BAO3, ZHIRUI ZENG3,*, WENPENG CAO4,*

    Oncology Research, Vol.32, No.12, pp. 1921-1934, 2024, DOI:10.32604/or.2024.046191 - 13 November 2024

    Abstract Background: The heterogeneity of prognosis and treatment benefits among patients with gliomas is due to tumor microenvironment characteristics. However, biomarkers that reflect microenvironmental characteristics and predict the prognosis of gliomas are limited. Therefore, we aimed to develop a model that can effectively predict prognosis, differentiate microenvironment signatures, and optimize drug selection for patients with glioma. Materials and Methods: The CIBERSORT algorithm, bulk sequencing analysis, and single-cell RNA (scRNA) analysis were employed to identify significant cross-talk genes between M2 macrophages and cancer cells in glioma tissues. A predictive model was constructed based on cross-talk gene expression, and… More >

  • Open Access

    ARTICLE

    Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion

    Hamad Naeem1, Amjad Alsirhani2,*, Faeiz M. Alserhani3, Farhan Ullah4, Ondrej Krejcar1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2185-2223, 2024, DOI:10.32604/cmes.2024.056308 - 31 October 2024

    Abstract When it comes to smart healthcare business systems, network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults. To protect IoMT devices and networks in healthcare and medical settings, our proposed model serves as a powerful tool for monitoring IoMT networks. This study presents a robust methodology for intrusion detection in Internet of Medical Things (IoMT) environments, integrating data augmentation, feature selection, and ensemble learning to effectively handle IoMT data complexity. Following rigorous preprocessing, including feature extraction, correlation removal, and Recursive Feature Elimination (RFE), selected features are standardized… More >

  • Open Access

    ARTICLE

    Multi-Label Feature Selection Based on Improved Ant Colony Optimization Algorithm with Dynamic Redundancy and Label Dependence

    Ting Cai1, Chun Ye1, Zhiwei Ye1,*, Ziyuan Chen1, Mengqing Mei1, Haichao Zhang1, Wanfang Bai2, Peng Zhang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1157-1175, 2024, DOI:10.32604/cmc.2024.055080 - 15 October 2024

    Abstract The world produces vast quantities of high-dimensional multi-semantic data. However, extracting valuable information from such a large amount of high-dimensional and multi-label data is undoubtedly arduous and challenging. Feature selection aims to mitigate the adverse impacts of high dimensionality in multi-label data by eliminating redundant and irrelevant features. The ant colony optimization algorithm has demonstrated encouraging outcomes in multi-label feature selection, because of its simplicity, efficiency, and similarity to reinforcement learning. Nevertheless, existing methods do not consider crucial correlation information, such as dynamic redundancy and label correlation. To tackle these concerns, the paper proposes a More >

  • Open Access

    ARTICLE

    A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection

    Chandraumakantham Om Kumar1,*, Sudhakaran Gajendran2, Suguna Marappan1, Mohammed Zakariah3, Abdulaziz S. Almazyad4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 471-501, 2024, DOI:10.32604/cmc.2024.054966 - 15 October 2024

    Abstract The security of the wireless sensor network-Internet of Things (WSN-IoT) network is more challenging due to its randomness and self-organized nature. Intrusion detection is one of the key methodologies utilized to ensure the security of the network. Conventional intrusion detection mechanisms have issues such as higher misclassification rates, increased model complexity, insignificant feature extraction, increased training time, increased run time complexity, computation overhead, failure to identify new attacks, increased energy consumption, and a variety of other factors that limit the performance of the intrusion system model. In this research a security framework for WSN-IoT, through… More >

  • Open Access

    ARTICLE

    Improved Harris Hawks Algorithm and Its Application in Feature Selection

    Qianqian Zhang1, Yingmei Li1,*, Jianjun Zhan2,*, Shan Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1251-1273, 2024, DOI:10.32604/cmc.2024.053892 - 15 October 2024

    Abstract This research focuses on improving the Harris’ Hawks Optimization algorithm (HHO) by tackling several of its shortcomings, including insufficient population diversity, an imbalance in exploration vs. exploitation, and a lack of thorough exploitation depth. To tackle these shortcomings, it proposes enhancements from three distinct perspectives: an initialization technique for populations grounded in opposition-based learning, a strategy for updating escape energy factors to improve the equilibrium between exploitation and exploration, and a comprehensive exploitation approach that utilizes variable neighborhood search along with mutation operators. The effectiveness of the Improved Harris Hawks Optimization algorithm (IHHO) is assessed by… More >

  • Open Access

    ARTICLE

    High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution

    Murad Njoum1,2,*, Rossilawati Sulaiman1, Zarina Shukur1, Faizan Qamar1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 183-211, 2024, DOI:10.32604/cmc.2024.050090 - 15 October 2024

    Abstract Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extraction tools to detect the hidden data and ensures high-quality stego image generation. However, using a seed key to generate non-repeated sequential numbers takes a long time because it requires specific mathematical equations. In addition, these numbers may cluster in certain ranges. The hidden data in these clustered pixels will reduce the image quality, which steganalysis tools can detect. Therefore, this paper proposes a… More >

Displaying 1-10 on page 1 of 512. Per Page