Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (157)
  • Open Access

    ARTICLE

    Transfer Learning on Deep Neural Networks to Detect Pornography

    Saleh Albahli*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 701-717, 2022, DOI:10.32604/csse.2022.022723

    Abstract While the internet has a lot of positive impact on society, there are negative components. Accessible to everyone through online platforms, pornography is, inducing psychological and health related issues among people of all ages. While a difficult task, detecting pornography can be the important step in determining the porn and adult content in a video. In this paper, an architecture is proposed which yielded high scores for both training and testing. This dataset was produced from 190 videos, yielding more than 19 h of videos. The main sources for the content were from YouTube, movies, torrent, and websites that hosts… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Vehicle Detection and Classification of Aerial Images

    Sandeep Kumar1, Arpit Jain2,*, Shilpa Rani3, Hammam Alshazly4, Sahar Ahmed Idris5, Sami Bourouis6

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 119-131, 2022, DOI:10.32604/iasc.2022.024812

    Abstract The detection of the objects in the ariel image has a significant impact on the field of parking space management, traffic management activities and surveillance systems. Traditional vehicle detection algorithms have some limitations as these algorithms are not working with the complex background and with the small size of object in bigger scenes. It is observed that researchers are facing numerous problems in vehicle detection and classification, i.e., complicated background, the vehicle’s modest size, other objects with similar visual appearances are not correctly addressed. A robust algorithm for vehicle detection and classification has been proposed to overcome the limitation of… More >

  • Open Access

    ARTICLE

    Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1, Ahmed Elhassanein5,6, Ashraf A. Gouda4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3385-3399, 2022, DOI:10.32604/cmc.2022.026477

    Abstract Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almost every action in university and college, right from the process from counselling to admissions and fee deposits has been automated. Attendance records, quiz, evaluation, mark, and grade submissions involved the utilization of the ICT. Therefore, security is essential to accomplish cybersecurity in higher security institutions (HEIs). In this view, this study develops an Automated Outlier Detection for CyberSecurity in Higher Education… More >

  • Open Access

    ARTICLE

    An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications

    Ghalib H. Alshammri1,2, Amani K. Samha3, Ezz El-Din Hemdan4, Mohammed Amoon1,4, Walid El-Shafai5,6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3529-3548, 2022, DOI:10.32604/cmc.2022.025262

    Abstract Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic process. In recent times, the most complex task in Software Defined Network (SDN) is security, which is based on a centralized, programmable controller. Therefore, monitoring network traffic is significant for identifying and revealing intrusion abnormalities in the SDN environment. Consequently, this paper provides an extensive analysis and investigation of the NSL-KDD dataset using five different clustering algorithms: K-means, Farthest First, Canopy, Density-based algorithm, and Exception-maximization (EM), using the Waikato Environment for Knowledge Analysis (WEKA) software to compare extensively between these five algorithms.… More >

  • Open Access

    ARTICLE

    Sammon Quadratic Recurrent Multilayer Deep Classifier for Legal Document Analytics

    Divya Mohan*, Latha Ravindran Nair

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3039-3053, 2022, DOI:10.32604/cmc.2022.024438

    Abstract In recent years, machine learning algorithms and in particular deep learning has shown promising results when used in the field of legal domain. The legal field is strongly affected by the problem of information overload, due to the large amount of legal material stored in textual form. Legal text processing is essential in the legal domain to analyze the texts of the court events to automatically predict smart decisions. With an increasing number of digitally available documents, legal text processing is essential to analyze documents which helps to automate various legal domain tasks. Legal document classification is a valuable tool… More >

  • Open Access

    ARTICLE

    Deep-piRNA: Bi-Layered Prediction Model for PIWI-Interacting RNA Using Discriminative Features

    Salman Khan1, Mukhtaj Khan1,2, Nadeem Iqbal1, Mohd Amiruddin Abd Rahman3,*, Muhammad Khalis Abdul Karim3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2243-2258, 2022, DOI:10.32604/cmc.2022.022901

    Abstract Piwi-interacting Ribonucleic acids (piRNAs) molecule is a well-known subclass of small non-coding RNA molecules that are mainly responsible for maintaining genome integrity, regulating gene expression, and germline stem cell maintenance by suppressing transposon elements. The piRNAs molecule can be used for the diagnosis of multiple tumor types and drug development. Due to the vital roles of the piRNA in computational biology, the identification of piRNAs has become an important area of research in computational biology. This paper proposes a two-layer predictor to improve the prediction of piRNAs and their function using deep learning methods. The proposed model applies various feature… More >

  • Open Access

    ARTICLE

    Lamport Certificateless Signcryption Deep Neural Networks for Data Aggregation Security in WSN

    P. Saravanakumar1, T. V. P. Sundararajan2, Rajesh Kumar Dhanaraj3, Kashif Nisar4,*, Fida Hussain Memon5,6, Ag. Asri Bin Ag. Ibrahim4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1835-1847, 2022, DOI:10.32604/iasc.2022.018953

    Abstract Confidentiality and data integrity are essential paradigms in data aggregation owing to the various cyberattacks in wireless sensor networks (WSNs). This study proposes a novel technique named Lamport certificateless signcryption-based shift-invariant connectionist artificial deep neural networks (LCS-SICADNN) by using artificial deep neural networks to develop the data aggregation security model. This model utilises the input layer with several sensor nodes, four hidden layers to overcome different attacks (data injection, compromised node, Sybil and black hole attacks) and the output layer to analyse the given input. The Lamport one-time certificateless signcryption technique involving three different processes (key generation, signcryption and unsigncryption)… More >

  • Open Access

    ARTICLE

    Prediction of Intrinsically Disordered Proteins Based on Deep Neural Network-ResNet18

    Jie Zhang, Jiaxiang Zhao*, Pengchang Xu

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.2, pp. 905-917, 2022, DOI:10.32604/cmes.2022.019097

    Abstract Accurately, reliably and rapidly identifying intrinsically disordered (IDPs) proteins is essential as they often play important roles in various human diseases; moreover, they are related to numerous important biological activities. However, current computational methods have yet to develop a network that is sufficiently deep to make predictions about IDPs and demonstrate an improvement in performance. During this study, we constructed a deep neural network that consisted of five identical variant models, ResNet18, combined with an MLP network, for classification. Resnet18 was applied for the first time as a deep model for predicting IDPs, which allowed the extraction of information from… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures

    Mahmoud Ragab1,2,3,*, Ali Altalbe1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1579-1592, 2022, DOI:10.32604/cmc.2022.025828

    Abstract Due to the drastic increase in the number of critical infrastructures like nuclear plants, industrial control systems (ICS), transportation, it becomes highly vulnerable to several attacks. They become the major targets of cyberattacks due to the increase in number of interconnections with other networks. Several research works have focused on the design of intrusion detection systems (IDS) using machine learning (ML) and deep learning (DL) models. At the same time, Blockchain (BC) technology can be applied to improve the security level. In order to resolve the security issues that exist in the critical infrastructures and ICS, this study designs a… More >

  • Open Access

    ARTICLE

    Criminal Persons Recognition Using Improved Feature Extraction Based Local Phase Quantization

    P. Karuppanan1,*, K. Dhanalakshmi2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1025-1043, 2022, DOI:10.32604/iasc.2022.023712

    Abstract Facial recognition is a trending technology that can identify or verify an individual from a video frame or digital image from any source. A major concern of facial recognition is achieving the accuracy on classification, precision, recall and F1-Score. Traditionally, numerous techniques involved in the working principle of facial recognition, as like Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Subspace Decomposition Method, Eigen Feature extraction Method and all are characterized as instable, poor generalization which leads to poor classification. But the simplified method is feature extraction by comparing the particular facial features of the images from the collected dataset… More >

Displaying 81-90 on page 9 of 157. Per Page