Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (744)
  • Open Access

    ARTICLE

    Traffic Flow Prediction with Heterogeneous Spatiotemporal Data Based on a Hybrid Deep Learning Model Using Attention-Mechanism

    Jing-Doo Wang1, Chayadi Oktomy Noto Susanto1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1711-1728, 2024, DOI:10.32604/cmes.2024.048955 - 20 May 2024

    Abstract A significant obstacle in intelligent transportation systems (ITS) is the capacity to predict traffic flow. Recent advancements in deep neural networks have enabled the development of models to represent traffic flow accurately. However, accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal factors. This paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory (Conv-BiLSTM) with attention mechanisms. Prior studies neglected to include data pertaining to factors such as holidays, weather conditions, and More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473 - 20 May 2024

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080 - 21 May 2024

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were… More >

  • Open Access

    ARTICLE

    Predicting 3D Radiotherapy Dose-Volume Based on Deep Learning

    Do Nang Toan1,*, Lam Thanh Hien2, Ha Manh Toan1, Nguyen Trong Vinh2, Pham Trung Hieu1

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 319-335, 2024, DOI:10.32604/iasc.2024.046925 - 21 May 2024

    Abstract Cancer is one of the most dangerous diseases with high mortality. One of the principal treatments is radiotherapy by using radiation beams to destroy cancer cells and this workflow requires a lot of experience and skill from doctors and technicians. In our study, we focused on the 3D dose prediction problem in radiotherapy by applying the deep-learning approach to computed tomography (CT) images of cancer patients. Medical image data has more complex characteristics than normal image data, and this research aims to explore the effectiveness of data preprocessing and augmentation in the context of the… More >

  • Open Access

    ARTICLE

    Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN)

    Abeer Abdullah Alsadhan1, Abdullah A. Al-Atawi2, Hanen karamti3, Abid Jameel4, Islam Zada5, Tan N. Nguyen6,*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 135-155, 2024, DOI:10.32604/iasc.2023.041130 - 21 May 2024

    Abstract IoT (Internet of Things) devices are being used more and more in a variety of businesses and for a variety of tasks, such as environmental data collection in both civilian and military situations. They are a desirable attack target for malware intended to infect specific IoT devices due to their growing use in a variety of applications and their increasing computational and processing power. In this study, we investigate the possibility of detecting IoT malware using recurrent neural networks (RNNs). RNN is used in the proposed method to investigate the execution operation codes of ARM-based More >

  • Open Access

    ARTICLE

    SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks

    Jiehao Ye, Wen Cheng, Xiaolong Liu, Wenyi Zhu, Xuan’ang Wu, Shigen Shen*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2743-2769, 2024, DOI:10.32604/cmc.2024.049985 - 15 May 2024

    Abstract The Internet of Things (IoT) has characteristics such as node mobility, node heterogeneity, link heterogeneity, and topology heterogeneity. In the face of the IoT characteristics and the explosive growth of IoT nodes, which brings about large-scale data processing requirements, edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions. However, the defense mechanism of Edge Computing-enabled IoT Nodes (ECIoTNs) is still weak due to their limited resources, so that they are susceptible to malicious software spread, which can compromise… More >

  • Open Access

    ARTICLE

    The Impact of Network Topologies and Radio Duty Cycle Mechanisms on the RPL Routing Protocol Power Consumption

    Amal Hkiri1,*, Hamzah Faraj2, Omar Ben Bahri2, Mouna Karmani1, Sami Alqurashi2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1835-1854, 2024, DOI:10.32604/cmc.2024.049207 - 15 May 2024

    Abstract The Internet of Things (IoT) has witnessed a significant surge in adoption, particularly through the utilization of Wireless Sensor Networks (WSNs), which comprise small internet-connected devices. These deployments span various environments and offer a multitude of benefits. However, the widespread use of battery-powered devices introduces challenges due to their limited hardware resources and communication capabilities. In response to this, the Internet Engineering Task Force (IETF) has developed the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) to address the unique requirements of such networks. Recognizing the critical role of RPL in maintaining high performance,… More >

  • Open Access

    ARTICLE

    Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System

    Hina Batool1, Jiuyun Xu1,*, Ateeq Ur Rehman2, Habib Hamam3,4,5,6

    Journal on Artificial Intelligence, Vol.6, pp. 105-128, 2024, DOI:10.32604/jai.2024.049912 - 06 May 2024

    Abstract Federated Learning (FL) appeared as an encouraging approach for handling decentralized data. Creating a FL system needs both machine learning (ML) knowledge and thinking about how to design system software. Researchers have focused a lot on the ML side of FL, but have not paid enough attention to designing the software architecture. So, in this survey, a set of design patterns is described to tackle the design issues. Design patterns are like reusable solutions for common problems that come up when designing software architecture. This paper focuses on (1) design patterns such as architectures, frameworks,… More >

  • Open Access

    ARTICLE

    Correlation Composition Awareness Model with Pair Collaborative Localization for IoT Authentication and Localization

    Kranthi Alluri, S. Gopikrishnan*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 943-961, 2024, DOI:10.32604/cmc.2024.048621 - 25 April 2024

    Abstract Secure authentication and accurate localization among Internet of Things (IoT) sensors are pivotal for the functionality and integrity of IoT networks. IoT authentication and localization are intricate and symbiotic, impacting both the security and operational functionality of IoT systems. Hence, accurate localization and lightweight authentication on resource-constrained IoT devices pose several challenges. To overcome these challenges, recent approaches have used encryption techniques with well-known key infrastructures. However, these methods are inefficient due to the increasing number of data breaches in their localization approaches. This proposed research efficiently integrates authentication and localization processes in such a… More >

  • Open Access

    ARTICLE

    Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment

    Sapiah Sakri1, Shakila Basheer1, Zuhaira Muhammad Zain1, Nurul Halimatul Asmak Ismail2,*, Dua’ Abdellatef Nassar1, Manal Abdullah Alohali1, Mais Ayman Alharaki1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1157-1185, 2024, DOI:10.32604/cmc.2024.048051 - 25 April 2024

    Abstract Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide. Timely detection is crucial as sepsis can rapidly escalate if left undetected. Recent advancements in deep learning (DL) offer powerful tools to address this challenge. Aim: Thus, this study proposed a hybrid CNNBDLSTM, a combination of a convolutional neural network (CNN) with a bi-directional long short-term memory (BDLSTM) model to predict sepsis onset. Implementing the proposed model provides a robust framework that capitalizes on the complementary strengths of both architectures, resulting in more accurate and timelier predictions. Method: The sepsis prediction… More >

Displaying 51-60 on page 6 of 744. Per Page