Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    MUS Model: A Deep Learning-Based Architecture for IoT Intrusion Detection

    Yu Yan1, Yu Yang1,*, Shen Fang1, Minna Gao2, Yiding Chen1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 875-896, 2024, DOI:10.32604/cmc.2024.051685

    Abstract In the face of the effective popularity of the Internet of Things (IoT), but the frequent occurrence of cybersecurity incidents, various cybersecurity protection means have been proposed and applied. Among them, Intrusion Detection System (IDS) has been proven to be stable and efficient. However, traditional intrusion detection methods have shortcomings such as low detection accuracy and inability to effectively identify malicious attacks. To address the above problems, this paper fully considers the superiority of deep learning models in processing high-dimensional data, and reasonable data type conversion methods can extract deep features and detect classification using… More >

  • Open Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562

    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access

    ARTICLE

    Urban Electric Vehicle Charging Station Placement Optimization with Graylag Goose Optimization Voting Classifier

    Amel Ali Alhussan1, Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,*, Marwa M. Eid2,3, Abdelhameed Ibrahim4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1163-1177, 2024, DOI:10.32604/cmc.2024.049001

    Abstract To reduce the negative effects that conventional modes of transportation have on the environment, researchers are working to increase the use of electric vehicles. The demand for environmentally friendly transportation may be hampered by obstacles such as a restricted range and extended rates of recharge. The establishment of urban charging infrastructure that includes both fast and ultra-fast terminals is essential to address this issue. Nevertheless, the powering of these terminals presents challenges because of the high energy requirements, which may influence the quality of service. Modelling the maximum hourly capacity of each station based on… More >

  • Open Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314

    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts More >

  • Open Access

    ARTICLE

    Depression Intensity Classification from Tweets Using FastText Based Weighted Soft Voting Ensemble

    Muhammad Rizwan1,2, Muhammad Faheem Mushtaq1, Maryam Rafiq2, Arif Mehmood3, Isabel de la Torre Diez4, Monica Gracia Villar5,6,7, Helena Garay5,8,9, Imran Ashraf10,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2047-2066, 2024, DOI:10.32604/cmc.2024.037347

    Abstract Predicting depression intensity from microblogs and social media posts has numerous benefits and applications, including predicting early psychological disorders and stress in individuals or the general public. A major challenge in predicting depression using social media posts is that the existing studies do not focus on predicting the intensity of depression in social media texts but rather only perform the binary classification of depression and moreover noisy data makes it difficult to predict the true depression in the social media text. This study intends to begin by collecting relevant Tweets and generating a corpus of… More >

  • Open Access

    ARTICLE

    Maximizing Influence in Temporal Social Networks: A Node Feature-Aware Voting Algorithm

    Wenlong Zhu1,2,*, Yu Miao1, Shuangshuang Yang3, Zuozheng Lian1,2, Lianhe Cui1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3095-3117, 2023, DOI:10.32604/cmc.2023.045646

    Abstract Influence Maximization (IM) aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes. However, most existing studies on the IM problem focus on static social network features, while neglecting the features of temporal social networks. To bridge this gap, we focus on node features reflected by their historical interaction behavior in temporal social networks, i.e., interaction attributes and self-similarity, and incorporate them into the influence maximization algorithm and information propagation model. Firstly, we propose… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556

    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework More >

  • Open Access

    ARTICLE

    Unweighted Voting Method to Detect Sinkhole Attack in RPL-Based Internet of Things Networks

    Shadi Al-Sarawi1, Mohammed Anbar1,*, Basim Ahmad Alabsi2, Mohammad Adnan Aladaileh3, Shaza Dawood Ahmed Rihan2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 491-515, 2023, DOI:10.32604/cmc.2023.041108

    Abstract The Internet of Things (IoT) consists of interconnected smart devices communicating and collecting data. The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standard protocol for Internet Protocol Version 6 (IPv6) in the IoT. However, RPL is vulnerable to various attacks, including the sinkhole attack, which disrupts the network by manipulating routing information. This paper proposes the Unweighted Voting Method (UVM) for sinkhole node identification, utilizing three key behavioral indicators: DODAG Information Object (DIO) Transaction Frequency, Rank Harmony, and Power Consumption. These indicators have been carefully selected based on their contribution to sinkhole… More >

  • Open Access

    ARTICLE

    Modified Metaheuristics with Weighted Majority Voting Ensemble Deep Learning Model for Intrusion Detection System

    Mahmoud Ragab1,2,*, Sultanah M. Alshammari2,3, Abdullah S. Al-Malaise Al-Ghamdi2,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2497-2512, 2023, DOI:10.32604/csse.2023.041446

    Abstract The Internet of Things (IoT) system has confronted dramatic growth in high dimensionality and data traffic. The system named intrusion detection systems (IDS) is broadly utilized for the enhancement of security posture in an IT infrastructure. An IDS is a practical and suitable method for assuring network security and identifying attacks by protecting it from intrusive hackers. Nowadays, machine learning (ML)-related techniques were used for detecting intrusion in IoTs IDSs. But, the IoT IDS mechanism faces significant challenges because of physical and functional diversity. Such IoT features use every attribute and feature for IDS self-protection… More >

  • Open Access

    ARTICLE

    Classifying Hematoxylin and Eosin Images Using a Super-Resolution Segmentor and a Deep Ensemble Classifier

    P. Sabitha*, G. Meeragandhi

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1983-2000, 2023, DOI:10.32604/iasc.2023.034402

    Abstract Developing an automatic and credible diagnostic system to analyze the type, stage, and level of the liver cancer from Hematoxylin and Eosin (H&E) images is a very challenging and time-consuming endeavor, even for experienced pathologists, due to the non-uniform illumination and artifacts. Albeit several Machine Learning (ML) and Deep Learning (DL) approaches are employed to increase the performance of automatic liver cancer diagnostic systems, the classification accuracy of these systems still needs significant improvement to satisfy the real-time requirement of the diagnostic situations. In this work, we present a new Ensemble Classifier (hereafter called ECNet)… More >

Displaying 1-10 on page 1 of 29. Per Page