Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    The Plateau Dilemma: Identifying Key Factors of Depression Risk among Middle-Aged and Older Chinese with Chronic Diseases

    Zhe He1, Yaning Zhang2,*

    International Journal of Mental Health Promotion, Vol.27, No.11, pp. 1747-1768, 2025, DOI:10.32604/ijmhp.2025.070491 - 28 November 2025

    Abstract Background: Depression represents a significant global mental health burden, particularly among middle-aged and older Chinese with chronic diseases in high-altitude regions, where harsh environmental conditions and limited social support exacerbate mental health disparities. This paper aims to develop an interpretable machine learning prediction framework to identify the key factors of depression in this vulnerable population, thereby proposing targeted intervention measures. Methods: Utilizing data from the China Health and Retirement Longitudinal Study in 2020, this paper screened out and analyzed 2431 samples. Subsequently, Recursive Feature Elimination and Least Absolute Shrinkage and Selection Operator were applied to screen… More >

  • Open Access

    ARTICLE

    A Filter-Based Feature Selection Framework to Detect Phishing URLs Using Stacking Ensemble Machine Learning

    Nimra Bari1, Tahir Saleem2, Munam Shah3, Abdulmohsen Algarni4, Asma Patel5,*, Insaf Ullah6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 1167-1187, 2025, DOI:10.32604/cmes.2025.070311 - 30 October 2025

    Abstract Today, phishing is an online attack designed to obtain sensitive information such as credit card and bank account numbers, passwords, and usernames. We can find several anti-phishing solutions, such as heuristic detection, virtual similarity detection, black and white lists, and machine learning (ML). However, phishing attempts remain a problem, and establishing an effective anti-phishing strategy is a work in progress. Furthermore, while most anti-phishing solutions achieve the highest levels of accuracy on a given dataset, their methods suffer from an increased number of false positives. These methods are ineffective against zero-hour attacks. Phishing sites with… More >

  • Open Access

    ARTICLE

    Securing Web by Predicting Malicious URLs

    Imran Khan, Meenakshi Megavarnam*

    Journal of Cyber Security, Vol.6, pp. 117-130, 2024, DOI:10.32604/jcs.2024.048332 - 06 December 2024

    Abstract A URL (Uniform Resource Locator) is used to locate a digital resource. With this URL, an attacker can perform a variety of attacks, which can lead to serious consequences for both individuals and organizations. Therefore, attackers create malicious URLs to gain access to an organization’s systems or sensitive information. It is crucial to secure individuals and organizations against these malicious URLs. A combination of machine learning and deep learning was used to predict malicious URLs. This research contributes significantly to the field of cybersecurity by proposing a model that seamlessly integrates the accuracy of machine More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366 - 18 December 2023

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used More >

  • Open Access

    ARTICLE

    Research on the Follow-Up Control Strategy of Biaxial Fatigue Test of Wind Turbine Blade Based on Electromagnetic Excitation

    Wenzhe Guo1, Leian Zhang1,*, Chao Lv2, Weisheng Liu3, Jiabin Tian2

    Energy Engineering, Vol.120, No.10, pp. 2307-2323, 2023, DOI:10.32604/ee.2023.030029 - 28 September 2023

    Abstract Aiming at the drift problem that the tracking control of the actual load relative to the target load during the electromagnetic excitation biaxial fatigue test of wind turbine blades is easy to drift, a biaxial fatigue testing machine for electromagnetic excitation is designed, and the following strategy of the actual load and the target load is studied. A Fast Transversal Recursive Least Squares algorithm based on fuzzy logic (Fuzzy FTRLS) is proposed to develop a fatigue loading following dynamic strategy, which adjusts the forgetting factor in the algorithm through fuzzy logic to overcome the contradiction More >

  • Open Access

    ARTICLE

    Improving QoS Using Mobility-Based Optimized Multipath Routing Protocol in MANET

    S. J. Sangeetha1,*, T. Rajendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1169-1181, 2023, DOI:10.32604/csse.2023.033392 - 20 January 2023

    Abstract Mobile Ad-hoc Networks (MANETs) connect numerous nodes to communicate data from the sender node to the target node. Due to the lack of an infrastructure network, mobile nodes communicate through wireless without an access point. MANET does not have a centralized controller and has a dynamic network topology, which increases link failure and energy consumption resulting in excessive path delay, loss of Quality of service (QoS), and reduced throughput during data communication. Congestion is a significant problem when the QoS of the link carrying the data is degraded. Routing is one of the vital challenges… More >

  • Open Access

    ARTICLE

    Impulsive Noise Cancellation in OFDM System Using Low Density Parity Check

    Attia Irum1, Abdul Muiz Fayyaz1, Sara Ayub2, Mudassar Raza3, Majed Alhaisoni4, Muhammad Attique Khan5, Abdullah Alqahtani6, Heebum Kim7, Byeong-Gwon Kang7,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1265-1276, 2023, DOI:10.32604/csse.2023.032861 - 20 January 2023

    Abstract An effective communication application necessitates the cancellation of Impulsive Noise (IN) from Orthogonal Frequency Division Multiplexing (OFDM), which is widely used for wireless applications due to its higher data rate and greater spectral efficiency. The OFDM system is typically corrupted by Impulsive Noise, which is an unwanted short-duration pulse with random amplitude and duration. Impulsive noise is created by humans and has non-Gaussian characteristics, causing problems in communication systems such as high capacity loss and poor error rate performance. Several techniques have been introduced in the literature to solve this type of problem, but they… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086 - 01 June 2022

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular… More >

  • Open Access

    ARTICLE

    Enhancing Detection of Malicious URLs Using Boosting and Lexical Features

    Mohammad Atrees*, Ashraf Ahmad, Firas Alghanim

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1405-1422, 2022, DOI:10.32604/iasc.2022.020229 - 09 October 2021

    Abstract A malicious URL is a link that is created to spread spams, phishing, malware, ransomware, spyware, etc. A user may download malware that can adversely affect the computer by clicking on an infected URL, or might be convinced to provide confidential information to a fraudulent website causing serious losses. These threats must be identified and handled in a decent time and in an effective way. Detection is traditionally done through the blacklist usage method, which relies on keyword matching with previously known malicious domain names stored in a repository. This method is fast and easy… More >

  • Open Access

    ARTICLE

    Adversarial Attacks on Featureless Deep Learning Malicious URLs Detection

    Bader Rasheed1, Adil Khan1, S. M. Ahsan Kazmi2, Rasheed Hussain2, Md. Jalil Piran3,*, Doug Young Suh4

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 921-939, 2021, DOI:10.32604/cmc.2021.015452 - 22 March 2021

    Abstract Detecting malicious Uniform Resource Locators (URLs) is crucially important to prevent attackers from committing cybercrimes. Recent researches have investigated the role of machine learning (ML) models to detect malicious URLs. By using ML algorithms, first, the features of URLs are extracted, and then different ML models are trained. The limitation of this approach is that it requires manual feature engineering and it does not consider the sequential patterns in the URL. Therefore, deep learning (DL) models are used to solve these issues since they are able to perform featureless detection. Furthermore, DL models give better… More >

Displaying 1-10 on page 1 of 15. Per Page