Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (155)
  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used. b) A new technique based… More >

  • Open Access

    ARTICLE

    Multi-Feature Fusion Book Recommendation Model Based on Deep Neural Network

    Zhaomin Liang, Tingting Liang*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 205-219, 2023, DOI:10.32604/csse.2023.037124

    Abstract The traditional recommendation algorithm represented by the collaborative filtering algorithm is the most classical and widely recommended algorithm in the practical industry. Most book recommendation systems also use this algorithm. However, the traditional recommendation algorithm represented by the collaborative filtering algorithm cannot deal with the data sparsity well. This algorithm only uses the shallow feature design of the interaction between readers and books, so it fails to achieve the high-level abstract learning of the relevant attribute features of readers and books, leading to a decline in recommendation performance. Given the above problems, this study uses deep learning technology to model… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    ResCD-FCN: Semantic Scene Change Detection Using Deep Neural Networks

    S. Eliza Femi Sherley1,*, J. M. Karthikeyan1, N. Bharath Raj1, R. Prabakaran2, A. Abinaya1, S. V. V. Lakshmi3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 215-227, 2022, DOI:10.32604/jai.2022.034931

    Abstract Semantic change detection is extension of change detection task in which it is not only used to identify the changed regions but also to analyze the land area semantic (labels/categories) details before and after the timelines are analyzed. Periodical land change analysis is used for many real time applications for valuation purposes. Majority of the research works are focused on Convolutional Neural Networks (CNN) which tries to analyze changes alone. Semantic information of changes appears to be missing, there by absence of communication between the different semantic timelines and changes detected over the region happens. To overcome this limitation, a… More >

  • Open Access

    ARTICLE

    Energy Efficient Hyperparameter Tuned Deep Neural Network to Improve Accuracy of Near-Threshold Processor

    K. Chanthirasekaran, Raghu Gundaala*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 471-489, 2023, DOI:10.32604/iasc.2023.036130

    Abstract When it comes to decreasing margins and increasing energy efficiency in near-threshold and sub-threshold processors, timing error resilience may be viewed as a potentially lucrative alternative to examine. On the other hand, the currently employed approaches have certain restrictions, including high levels of design complexity, severe time constraints on error consolidation and propagation, and uncontaminated architectural registers (ARs). The design of near-threshold circuits, often known as NT circuits, is becoming the approach of choice for the construction of energy-efficient digital circuits. As a result of the exponentially decreased driving current, there was a reduction in performance, which was one of… More >

  • Open Access

    ARTICLE

    CNN-LSTM: A Novel Hybrid Deep Neural Network Model for Brain Tumor Classification

    R. D. Dhaniya1, K. M. Umamaheswari2,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1129-1143, 2023, DOI:10.32604/iasc.2023.035905

    Abstract Current revelations in medical imaging have seen a slew of computer-aided diagnostic (CAD) tools for radiologists developed. Brain tumor classification is essential for radiologists to fully support and better interpret magnetic resonance imaging (MRI). In this work, we reported on new observations based on binary brain tumor categorization using HYBRID CNN-LSTM. Initially, the collected image is pre-processed and augmented using the following steps such as rotation, cropping, zooming, CLAHE (Contrast Limited Adaptive Histogram Equalization), and Random Rotation with panoramic stitching (RRPS). Then, a method called particle swarm optimization (PSO) is used to segment tumor regions in an MR image. After… More >

  • Open Access

    ARTICLE

    A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition

    Muhammad Aamir1, Ziaur Rahman1,*, Waheed Ahmed Abro2, Uzair Aslam Bhatti3, Zaheer Ahmed Dayo1, Muhammad Ishfaq1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6351-6373, 2023, DOI:10.32604/cmc.2023.038173

    Abstract Object detection in images has been identified as a critical area of research in computer vision image processing. Research has developed several novel methods for determining an object’s location and category from an image. However, there is still room for improvement in terms of detection efficiency. This study aims to develop a technique for detecting objects in images. To enhance overall detection performance, we considered object detection a two-fold problem, including localization and classification. The proposed method generates class-independent, high-quality, and precise proposals using an agglomerative clustering technique. We then combine these proposals with the relevant input image to train… More >

  • Open Access

    REVIEW

    A Survey on Artificial Intelligence in Posture Recognition

    Xiaoyan Jiang1,2, Zuojin Hu1, Shuihua Wang2, Yudong Zhang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 35-82, 2023, DOI:10.32604/cmes.2023.027676

    Abstract Over the years, the continuous development of new technology has promoted research in the field of posture recognition and also made the application field of posture recognition have been greatly expanded. The purpose of this paper is to introduce the latest methods of posture recognition and review the various techniques and algorithms of posture recognition in recent years, such as scale-invariant feature transform, histogram of oriented gradients, support vector machine (SVM), Gaussian mixture model, dynamic time warping, hidden Markov model (HMM), lightweight network, convolutional neural network (CNN). We also investigate improved methods of CNN, such as stacked hourglass networks, multi-stage… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

Displaying 31-40 on page 4 of 155. Per Page