Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12)
  • Open Access

    ARTICLE

    Ensemble Deep Learning with Chimp Optimization Based Medical Data Classification

    Ashit Kumar Dutta1,*, Yasser Albagory2, Majed Alsanea3, Hamdan I. Almohammed4, Abdul Rahaman Wahab Sait5

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1643-1655, 2023, DOI:10.32604/iasc.2023.027865

    Abstract Eye state classification acts as a vital part of the biomedical sector, for instance, smart home device control, drowsy driving recognition, and so on. The modifications in the cognitive levels can be reflected via transforming the electroencephalogram (EEG) signals. The deep learning (DL) models automated extract the features and often showcased improved outcomes over the conventional classification model in the recognition processes. This paper presents an Ensemble Deep Learning with Chimp Optimization Algorithm for EEG Eye State Classification (EDLCOA-ESC). The proposed EDLCOA-ESC technique involves min-max normalization approach as a pre-processing step. Besides, wavelet packet decomposition More >

  • Open Access

    ARTICLE

    Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network

    Fatmah Alanazi*, Kamal Jambi, Fathy Eassa, Maher Khemakhem, Abdullah Basuhail, Khalid Alsubhi

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 923-938, 2022, DOI:10.32604/iasc.2022.024668

    Abstract Software-defined network (SDN) is an enabling technology that meets the demand of dynamic, adaptable, and manageable networking architecture for the future. In contrast to the traditional networks that are based on a distributed control plane, the control plane of SDN is based on a centralized architecture. As a result, SDNs are susceptible to critical cyber attacks that exploit the single point of failure. A distributed denial of service (DDoS) attack is one of the most crucial and risky attacks, targeting the SDN controller and disrupting its services. Several researchers have proposed signature-based DDoS mitigation and… More >

Displaying 11-20 on page 2 of 12. Per Page