Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (55)
  • Open Access

    ARTICLE

    Bi-LSTM-Based Deep Stacked Sequence-to-Sequence Autoencoder for Forecasting Solar Irradiation and Wind Speed

    Neelam Mughees1,2, Mujtaba Hussain Jaffery1, Abdullah Mughees3, Anam Mughees4, Krzysztof Ejsmont5,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6375-6393, 2023, DOI:10.32604/cmc.2023.038564

    Abstract Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by 2050. However, they are exceedingly unpredictable since they rely highly on weather and atmospheric conditions. In microgrids, smart energy management systems, such as integrated demand response programs, are permanently established on a step-ahead basis, which means that accurate forecasting of wind speed and solar irradiance intervals is becoming increasingly crucial to the optimal operation and planning of microgrids. With this in mind, a novel “bidirectional long short-term memory network” (Bi-LSTM)-based, deep stacked, sequence-to-sequence autoencoder (S2SAE) forecasting model… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuned Deep Hybrid Denoising Autoencoder Breast Cancer Classification on Digital Mammograms

    Manar Ahmed Hamza*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2879-2895, 2023, DOI:10.32604/iasc.2023.034719

    Abstract Breast Cancer (BC) is considered the most commonly scrutinized cancer in women worldwide, affecting one in eight women in a lifetime. Mammography screening becomes one such standard method that is helpful in identifying suspicious masses’ malignancy of BC at an initial level. However, the prior identification of masses in mammograms was still challenging for extremely dense and dense breast categories and needs an effective and automatic mechanisms for helping radiotherapists in diagnosis. Deep learning (DL) techniques were broadly utilized for medical imaging applications, particularly breast mass classification. The advancements in the DL field paved the way for highly intellectual and… More >

  • Open Access

    ARTICLE

    Gender Identification Using Marginalised Stacked Denoising Autoencoders on Twitter Data

    Badriyya B. Al-onazi1, Mohamed K. Nour2, Hassan Alshamrani3, Mesfer Al Duhayyim4,*, Heba Mohsen5, Amgad Atta Abdelmageed6, Gouse Pasha Mohammed6, Abu Sarwar Zamani6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2529-2544, 2023, DOI:10.32604/iasc.2023.034623

    Abstract Gender analysis of Twitter could reveal significant socio-cultural differences between female and male users. Efforts had been made to analyze and automatically infer gender formerly for more commonly spoken languages’ content, but, as we now know that limited work is being undertaken for Arabic. Most of the research works are done mainly for English and least amount of effort for non-English language. The study for Arabic demographic inference like gender is relatively uncommon for social networking users, especially for Twitter. Therefore, this study aims to design an optimal marginalized stacked denoising autoencoder for gender identification on Arabic Twitter (OMSDAE-GIAT) model.… More >

  • Open Access

    ARTICLE

    A Novel Deep Learning Representation for Industrial Control System Data

    Bowen Zhang1,2,3, Yanbo Shi4, Jianming Zhao1,2,3,*, Tianyu Wang1,2,3, Kaidi Wang5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2703-2717, 2023, DOI:10.32604/iasc.2023.033762

    Abstract Feature extraction plays an important role in constructing artificial intelligence (AI) models of industrial control systems (ICSs). Three challenges in this field are learning effective representation from high-dimensional features, data heterogeneity, and data noise due to the diversity of data dimensions, formats and noise of sensors, controllers and actuators. Hence, a novel unsupervised learning autoencoder model is proposed for ICS data in this paper. Although traditional methods only capture the linear correlations of ICS features, our deep industrial representation learning model (DIRL) based on a convolutional neural network can mine high-order features, thus solving the problem of high-dimensional and heterogeneous… More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Younghoon Ban, Jeong Hyun Yi, Haehyun Cho*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555

    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their behaviors by conducting the familial… More >

  • Open Access

    ARTICLE

    A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things

    Maha Sabir1, Jawad Ahmad2,*, Daniyal Alghazzawi1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 57-72, 2023, DOI:10.32604/csse.2023.034277

    Abstract The Internet of things (IoT) is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision. Despite several advantages, the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals. A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries. To overcome the security challenges of IoT networks, this article proposes a lightweight deep autoencoder (DAE) based cyberattack detection framework. The proposed… More >

  • Open Access

    ARTICLE

    A Convolutional Autoencoder Based Fault Detection Method for Metro Railway Turnout

    Chen Chen1,2, Xingqiu Li2,3,*, Kai Huang4, Zhongwei Xu1, Meng Mei1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 471-485, 2023, DOI:10.32604/cmes.2023.024033

    Abstract Railway turnout is one of the critical equipment of Switch & Crossing (S&C) Systems in railway, related to the train’s safety and operation efficiency. With the advancement of intelligent sensors, data-driven fault detection technology for railway turnout has become an important research topic. However, little research in the literature has investigated the capability of data-driven fault detection technology for metro railway turnout. This paper presents a convolutional autoencoder-based fault detection method for the metro railway turnout considering human field inspection scenarios. First, the one-dimensional original time-series signal is converted into a two-dimensional image by data pre-processing and 2D representation. Next,… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176

    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed to secure the SDN-enabled IoT… More >

  • Open Access

    ARTICLE

    A New Intrusion Detection Algorithm AE-3WD for Industrial Control Network

    Yongzhong Li1,2,*, Cong Li1, Yuheng Li3, Shipeng Zhang2

    Journal of New Media, Vol.4, No.4, pp. 205-217, 2022, DOI:10.32604/jnm.2022.034778

    Abstract In this paper, we propose a intrusion detection algorithm based on auto-encoder and three-way decisions (AE-3WD) for industrial control networks, aiming at the security problem of industrial control network. The ideology of deep learning is similar to the idea of intrusion detection. Deep learning is a kind of intelligent algorithm and has the ability of automatically learning. It uses self-learning to enhance the experience and dynamic classification capabilities. We use deep learning to improve the intrusion detection rate and reduce the false alarm rate through learning, a denoising AutoEncoder and three-way decisions intrusion detection method AE-3WD is proposed to improve… More >

Displaying 1-10 on page 1 of 55. Per Page  

Share Link