Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    Variant Wasserstein Generative Adversarial Network Applied on Low Dose CT Image Denoising

    Anoud A. Mahmoud1,*, Hanaa A. Sayed2,3, Sara S. Mohamed1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4535-4552, 2023, DOI:10.32604/cmc.2023.037087

    Abstract Computed Tomography (CT) images have been extensively employed in disease diagnosis and treatment, causing a huge concern over the dose of radiation to which patients are exposed. Increasing the radiation dose to get a better image may lead to the development of genetic disorders and cancer in the patients; on the other hand, decreasing it by using a Low-Dose CT (LDCT) image may cause more noise and increased artifacts, which can compromise the diagnosis. So, image reconstruction from LDCT image data is necessary to improve radiologists’ judgment and confidence. This study proposed three novel models for denoising LDCT images based… More >

  • Open Access

    ARTICLE

    Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing

    Emad Alsuwat1,*, Suhare Solaiman1, Hatim Alsuwat2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3743-3759, 2023, DOI:10.32604/cmc.2023.035126

    Abstract Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning (ML) models. Due to attackers’ (and/or benign equivalents’) dynamic behavior changes, testing data distribution frequently diverges from original training data over time, resulting in substantial model failures. Due to their dispersed and dynamic nature, distributed denial-of-service attacks pose a danger to cybersecurity, resulting in attacks with serious consequences for users and businesses. This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service (DDOS) in the network.… More >

  • Open Access

    ARTICLE

    The effect of natural products combination on MCF-7 cells exceeds tamoxifen therapeutic dose effects in vitro

    ZEINAB KLAAB1, AZIZA HASSAN2, JAWAHER ALBAQAMI1, FAIZAH A. ALMALKI1,*

    BIOCELL, Vol.47, No.4, pp. 891-904, 2023, DOI:10.32604/biocell.2023.026556

    Abstract Cancer remains to be one of the most severe sicknesses globally. Cases have kept rising over the years. Breast cancer (BC), which is among the leading types of cancers and predominantly affects women, is the second leading cause of cancer mortality. Researchers have developed interventions over the years; however, the BC survival rate has not improved since the 1980s. This has created the need for novel drug interventions that would manage and treat BC more effectively. This study focused on using a combination of natural product extracts such as phytoestrogen (Ziziphus jujube) and Tannin nanoparticles (NP99) together, which we have… More >

  • Open Access

    ARTICLE

    Optimized Identification with Severity Factors of Gastric Cancer for Internet of Medical Things

    Kamalrulnizam Bin Abu Bakar1, Fatima Tul Zuhra2,*, Babangida Isyaku1,3, Fuad A. Ghaleb1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 785-798, 2023, DOI:10.32604/cmc.2023.034540

    Abstract The Internet of Medical Things (IoMT) emerges with the vision of the Wireless Body Sensor Network (WBSN) to improve the health monitoring systems and has an enormous impact on the healthcare system for recognizing the levels of risk/severity factors (premature diagnosis, treatment, and supervision of chronic disease i.e., cancer) via wearable/electronic health sensor i.e., wireless endoscopic capsule. However, AI-assisted endoscopy plays a very significant role in the detection of gastric cancer. Convolutional Neural Network (CNN) has been widely used to diagnose gastric cancer based on various feature extraction models, consequently, limiting the identification and categorization performance in terms of cancerous… More >

  • Open Access

    ARTICLE

    Gastrointestinal Diseases Classification Using Deep Transfer Learning and Features Optimization

    Mousa Alhajlah1, Muhammad Nouman Noor2, Muhammad Nazir2, Awais Mahmood1,*, Imran Ashraf3, Tehmina Karamat4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2227-2245, 2023, DOI:10.32604/cmc.2023.031890

    Abstract Gastrointestinal diseases like ulcers, polyps’, and bleeding are increasing rapidly in the world over the last decade. On average 0.7 million cases are reported worldwide every year. The main cause of gastrointestinal diseases is a Helicobacter Pylori (H. Pylori) bacterium that presents in more than 50% of people around the globe. Many researchers have proposed different methods for gastrointestinal disease using computer vision techniques. Few of them focused on the detection process and the rest of them performed classification. The major challenges that they faced are the similarity of infected and healthy regions that misleads the correct classification accuracy. In… More >

  • Open Access

    ARTICLE

    An Immutable Framework for Smart Healthcare Using Blockchain Technology

    Faneela1, Muazzam A. Khan1, Suliman A. Alsuhibany2,*, Walid El-Shafai3,4, Mujeeb Ur Rehman5, Jawad Ahmad6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 165-179, 2023, DOI:10.32604/csse.2023.035066

    Abstract The advancements in sensing technologies, information processing, and communication schemes have revolutionized the healthcare sector. Electronic Healthcare Records (EHR) facilitate the patients, doctors, hospitals, and other stakeholders to maintain valuable data and medical records. The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks. A single attempt of a successful Denial of Service (DoS) attack can compromise the complete healthcare system. This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things (IoMT) to address the stated challenges. The proposed architecture is on the idea of a lightweight private blockchain-based network that… More >

  • Open Access

    ARTICLE

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5607-5623, 2023, DOI:10.32604/cmc.2023.031047

    Abstract IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed over the last decades to… More >

  • Open Access

    ARTICLE

    A Novel Framework for DDoS Attacks Detection Using Hybrid LSTM Techniques

    Anitha Thangasamy*, Bose Sundan, Logeswari Govindaraj

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2553-2567, 2023, DOI:10.32604/csse.2023.032078

    Abstract The recent development of cloud computing offers various services on demand for organization and individual users, such as storage, shared computing space, networking, etc. Although Cloud Computing provides various advantages for users, it remains vulnerable to many types of attacks that attract cyber criminals. Distributed Denial of Service (DDoS) is the most common type of attack on cloud computing. Consequently, Cloud computing professionals and security experts have focused on the growth of preventive processes towards DDoS attacks. Since DDoS attacks have become increasingly widespread, it becomes difficult for some DDoS attack methods based on individual network flow features to distinguish… More >

  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple controllers to handle network traffic… More >

  • Open Access

    ARTICLE

    DoS Attack Detection Based on Deep Factorization Machine in SDN

    Jing Wang1, Xiangyu Lei1, Qisheng Jiang1, Osama Alfarraj2, Amr Tolba2, Gwang-jun Kim3,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1727-1742, 2023, DOI:10.32604/csse.2023.030183

    Abstract Software-Defined Network (SDN) decouples the control plane of network devices from the data plane. While alleviating the problems presented in traditional network architectures, it also brings potential security risks, particularly network Denial-of-Service (DoS) attacks. While many research efforts have been devoted to identifying new features for DoS attack detection, detection methods are less accurate in detecting DoS attacks against client hosts due to the high stealth of such attacks. To solve this problem, a new method of DoS attack detection based on Deep Factorization Machine (DeepFM) is proposed in SDN. Firstly, we select the Growth Rate of Max Matched Packets… More >

Displaying 21-30 on page 3 of 92. Per Page