Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    An Efficient Stacked-LSTM Based User Clustering for 5G NOMA Systems

    S. Prabha Kumaresan1, Chee Keong Tan2,*, Yin Hoe Ng1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6119-6140, 2022, DOI:10.32604/cmc.2022.027223

    Abstract Non-orthogonal multiple access (NOMA) has been a key enabling technology for the fifth generation (5G) cellular networks. Based on the NOMA principle, a traditional neural network has been implemented for user clustering (UC) to maximize the NOMA system’s throughput performance by considering that each sample is independent of the prior and the subsequent ones. Consequently, the prediction of UC for the future ones is based on the current clustering information, which is never used again due to the lack of memory of the network. Therefore, to relate the input features of NOMA users and capture the dependency in the clustering… More >

  • Open Access

    ARTICLE

    Machine Learning in Detecting Schizophrenia: An Overview

    Gurparsad Singh Suri1, Gurleen Kaur1, Sara Moein2,*

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 723-735, 2021, DOI:10.32604/iasc.2021.015049

    Abstract Schizophrenia (SZ) is a mental heterogeneous psychiatric disorder with unknown cause. Neuroscientists postulate that it is related to brain networks. Recently, scientists applied machine learning (ML) and artificial intelligence for the detection, monitoring, and prognosis of a range of diseases, including SZ, because these techniques show a high performance in discovering an association between disease symptoms and disease. Regions of the brain have significant connections to the symptoms of SZ. ML has the power to detect these associations. ML interests researchers because of its ability to reduce the number of input features when the data are high dimensional. In this… More >

  • Open Access

    ARTICLE

    Predicting Concentration of PM10 Using Optimal Parameters of Deep Neural Network

    Byoung-Doo Oha,b, Hye-Jeong Songa,b, Jong-Dae Kima,b, Chan-Young Parka,b, Yu-Seop Kima,b

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 343-350, 2019, DOI:10.31209/2019.100000095

    Abstract Accurate prediction of fine dust (PM10) concentration is currently recognized as an important problem in East Asia. In this paper, we try to predict the concentration of PM10 using Deep Neural Network (DNN). Meteorological factors, yellow dust (sand), fog, and PM10 are used as input data. We test two cases. The first case predicts the concentration of PM10 on the next day using the day’s weather forecast data. The second case predicts the concentration of PM10 on the next day using the previous day’s data. Based on this, we compare the various performance results from the DNN model. In the… More >

  • Open Access

    ARTICLE

    A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network

    Assia Maamar1,*, Khelifa Benahmed2

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 15-39, 2019, DOI:10.32604/cmc.2019.06497

    Abstract Recently, the radical digital transformation has deeply affected the traditional electricity grid and transformed it into an intelligent network (smart grid). This mutation is based on the progressive development of advanced technologies: advanced metering infrastructure (AMI) and smart meter which play a crucial role in the development of smart grid. AMI technologies have a promising potential in terms of improvement in energy efficiency, better demand management, and reduction in electricity costs. However the possibility of hacking smart meters and electricity theft is still among the most significant challenges facing electricity companies. In this regard, we propose a hybrid approach to… More >

Displaying 1-10 on page 1 of 8. Per Page