Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (41)
  • Open Access

    ARTICLE

    PoIR: A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    Jauzak Hussaini Windiatmaja, Delphi Hanggoro, Muhammad Salman, Riri Fitri Sari*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2309-2339, 2023, DOI:10.32604/cmc.2023.041152

    Abstract This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation (PoIR) as an alternative to traditional Proof of Work (PoW). PoIR addresses the limitations of existing reputation-based consensus mechanisms by proposing a more decentralized and fair node selection process. The proposed PoIR consensus combines Bidirectional Long Short-Term Memory (BiLSTM) with the Network Entity Reputation Database (NERD) to generate reputation scores for network entities and select authoritative nodes. NERD records network entity profiles based on various sources, i.e., Warden, Blacklists, DShield, AlienVault Open Threat Exchange (OTX), and MISP (Malware Information Sharing Platform). It summarizes these profile records into… More >

  • Open Access

    ARTICLE

    Fake News Classification: Past, Current, and Future

    Muhammad Usman Ghani Khan1, Abid Mehmood2, Mourad Elhadef2, Shehzad Ashraf Chaudhry2,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2225-2249, 2023, DOI:10.32604/cmc.2023.038303

    Abstract The proliferation of deluding data such as fake news and phony audits on news web journals, online publications, and internet business apps has been aided by the availability of the web, cell phones, and social media. Individuals can quickly fabricate comments and news on social media. The most difficult challenge is determining which news is real or fake. Accordingly, tracking down programmed techniques to recognize fake news online is imperative. With an emphasis on false news, this study presents the evolution of artificial intelligence techniques for detecting spurious social media content. This study shows past, current, and possible methods that… More >

  • Open Access

    ARTICLE

    Intelligence COVID-19 Monitoring Framework Based on Deep Learning and Smart Wearable IoT Sensors

    Fadhil Mukhlif1,*, Norafida Ithnin1, Roobaea Alroobaea2, Sultan Algarni3, Wael Y. Alghamdi2, Ibrahim Hashem4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 583-599, 2023, DOI:10.32604/cmc.2023.038757

    Abstract The World Health Organization (WHO) refers to the 2019 new coronavirus epidemic as COVID-19, and it has caused an unprecedented global crisis for several nations. Nearly every country around the globe is now very concerned about the effects of the COVID-19 outbreaks, which were previously only experienced by Chinese residents. Most of these nations are now under a partial or complete state of lockdown due to the lack of resources needed to combat the COVID-19 epidemic and the concern about overstretched healthcare systems. Every time the pandemic surprises them by providing new values for various parameters, all the connected research… More >

  • Open Access

    ARTICLE

    Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model

    Abdulgbar A. R. Farea1, Gehad Abdullah Amran2,*, Ebraheem Farea3, Amerah Alabrah4,*, Ahmed A. Abdulraheem5, Muhammad Mursil6, Mohammed A. A. Al-qaness7

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3605-3622, 2023, DOI:10.32604/cmc.2023.040121

    Abstract E-commerce, online ticketing, online banking, and other web-based applications that handle sensitive data, such as passwords, payment information, and financial information, are widely used. Various web developers may have varying levels of understanding when it comes to securing an online application. Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the Open Web Application Security Project (OWASP) for its 2017 Top Ten List Cross Site Scripting (XSS). An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws. Many published articles focused on these attacks’ binary classification. This… More >

  • Open Access

    ARTICLE

    An Improved Time Feedforward Connections Recurrent Neural Networks

    Jin Wang1,2, Yongsong Zou1, Se-Jung Lim3,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2743-2755, 2023, DOI:10.32604/iasc.2023.033869

    Abstract Recurrent Neural Networks (RNNs) have been widely applied to deal with temporal problems, such as flood forecasting and financial data processing. On the one hand, traditional RNNs models amplify the gradient issue due to the strict time serial dependency, making it difficult to realize a long-term memory function. On the other hand, RNNs cells are highly complex, which will significantly increase computational complexity and cause waste of computational resources during model training. In this paper, an improved Time Feedforward Connections Recurrent Neural Networks (TFC-RNNs) model was first proposed to address the gradient issue. A parallel branch was introduced for the… More >

  • Open Access

    ARTICLE

    Accurate Phase Detection for ZigBee Using Artificial Neural Network

    Ali Alqahtani1, Abdulaziz A. Alsulami2,*, Saeed Alahmari3, Mesfer Alrizq4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2505-2518, 2023, DOI:10.32604/iasc.2023.033243

    Abstract The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability, scalability, and enhancement of wireless mesh networking. This standard uses a physical layer of binary phase-shift keying (BPSK) modulation and can be operated with two frequency bands, 868 and 915 MHz. The frequency noise could interfere with the BPSK signal, which causes distortion to the signal before its arrival at receiver. Therefore, filtering the BPSK signal from noise is essential to ensure carrying the signal from the sender to the receiver with less error. Therefore, removing signal noise in the BPSK signal is… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    Advance IoT Intelligent Healthcare System for Lung Disease Classification Using Ensemble Techniques

    J. Prabakaran1,*, P. Selvaraj2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2141-2157, 2023, DOI:10.32604/csse.2023.034210

    Abstract In healthcare systems, the Internet of Things (IoT) innovation and development approached new ways to evaluate patient data. A cloud-based platform tends to process data generated by IoT medical devices instead of high storage, and computational hardware. In this paper, an intelligent healthcare system has been proposed for the prediction and severity analysis of lung disease from chest computer tomography (CT) images of patients with pneumonia, Covid-19, tuberculosis (TB), and cancer. Firstly, the CT images are captured and transmitted to the fog node through IoT devices. In the fog node, the image gets modified into a convenient and efficient format… More >

  • Open Access

    ARTICLE

    Fast Detection and Classification of Dangerous Urban Sounds Using Deep Learning

    Zeinel Momynkulov1, Zhandos Dosbayev2,3,*, Azizah Suliman4, Bayan Abduraimova5, Nurzhigit Smailov2, Maigul Zhekambayeva2, Dusmat Zhamangarin6

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2191-2208, 2023, DOI:10.32604/cmc.2023.036205

    Abstract Video analytics is an integral part of surveillance cameras. Compared to video analytics, audio analytics offers several benefits, including less expensive equipment and upkeep expenses. Additionally, the volume of the audio datastream is substantially lower than the video camera datastream, especially concerning real-time operating systems, which makes it less demanding of the data channel’s bandwidth needs. For instance, automatic live video streaming from the site of an explosion and gunshot to the police console using audio analytics technologies would be exceedingly helpful for urban surveillance. Technologies for audio analytics may also be used to analyze video recordings and identify occurrences.… More >

  • Open Access

    ARTICLE

    Continuous Mobile User Authentication Using a Hybrid CNN-Bi-LSTM Approach

    Sarah Alzahrani1, Joud Alderaan1, Dalya Alatawi1, Bandar Alotaibi1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 651-667, 2023, DOI:10.32604/cmc.2023.035173

    Abstract Internet of Things (IoT) devices incorporate a large amount of data in several fields, including those of medicine, business, and engineering. User authentication is paramount in the IoT era to assure connected devices’ security. However, traditional authentication methods and conventional biometrics-based authentication approaches such as face recognition, fingerprints, and password are vulnerable to various attacks, including smudge attacks, heat attacks, and shoulder surfing attacks. Behavioral biometrics is introduced by the powerful sensing capabilities of IoT devices such as smart wearables and smartphones, enabling continuous authentication. Artificial Intelligence (AI)-based approaches introduce a bright future in refining large amounts of homogeneous biometric… More >

Displaying 1-10 on page 1 of 41. Per Page