Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (18)
  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    Enhancing Multicriteria-Based Recommendations by Alleviating Scalability and Sparsity Issues Using Collaborative Denoising Autoencoder

    S. Abinaya*, K. Uttej Kumar

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2269-2286, 2024, DOI:10.32604/cmc.2024.047167

    Abstract A Recommender System (RS) is a crucial part of several firms, particularly those involved in e-commerce. In conventional RS, a user may only offer a single rating for an item-that is insufficient to perceive consumer preferences. Nowadays, businesses in industries like e-learning and tourism enable customers to rate a product using a variety of factors to comprehend customers’ preferences. On the other hand, the collaborative filtering (CF) algorithm utilizing AutoEncoder (AE) is seen to be effective in identifying user-interested items. However, the cost of these computations increases nonlinearly as the number of items and users increases. To triumph over the… More >

  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs. This work proposes a new… More >

  • Open Access

    ARTICLE

    Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 265-298, 2023, DOI:10.32604/cmes.2023.027581

    Abstract Due to the increasing number of cyber-attacks, the necessity to develop efficient intrusion detection systems (IDS) is more imperative than ever. In IDS research, the most effectively used methodology is based on supervised Neural Networks (NN) and unsupervised clustering, but there are few works dedicated to their hybridization with metaheuristic algorithms. As intrusion detection data usually contains several features, it is essential to select the best ones appropriately. Linear Discriminant Analysis (LDA) and t-statistic are considered as efficient conventional techniques to select the best features, but they have been little exploited in IDS design. Thus, the research proposed in this… More >

  • Open Access

    ARTICLE

    A Novel Soft Clustering Method for Detection of Exudates

    Kittipol Wisaeng*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1039-1058, 2023, DOI:10.32604/csse.2023.034901

    Abstract One of the earliest indications of diabetes consequence is Diabetic Retinopathy (DR), the main contributor to blindness worldwide. Recent studies have proposed that Exudates (EXs) are the hallmark of DR severity. The present study aims to accurately and automatically detect EXs that are difficult to detect in retinal images in the early stages. An improved Fusion of Histogram–Based Fuzzy C–Means Clustering (FHBFCM) by a New Weight Assignment Scheme (NWAS) and a set of four selected features from stages of pre-processing to evolve the detection method is proposed. The features of DR train the optimal parameter of FHBFCM for detecting EXs… More >

  • Open Access

    ARTICLE

    Employment Quality Evaluation Model Based on Hybrid Intelligent Algorithm

    Xianhui Gu1,*, Xiaokan Wang1, Shuang Liang2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 131-139, 2023, DOI:10.32604/cmc.2023.028756

    Abstract In order to solve the defect of large error in current employment quality evaluation, an employment quality evaluation model based on grey correlation degree method and fuzzy C-means (FCM) is proposed. Firstly, it analyzes the related research work of employment quality evaluation, establishes the employment quality evaluation index system, collects the index data, and normalizes the index data; Then, the weight value of employment quality evaluation index is determined by Grey relational analysis method, and some unimportant indexes are removed; Finally, the employment quality evaluation model is established by using fuzzy cluster analysis algorithm, and compared with other employment quality… More >

  • Open Access

    ARTICLE

    Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction

    S. J. K. Jagadeesh Kumar1, P. Parthasarathi2, Mehedi Masud3, Jehad F. Al-Amri4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2909-2924, 2023, DOI:10.32604/iasc.2023.030335

    Abstract The main task of thyroid hormones is controlling the metabolism rate of humans, the development of neurons, and the significant growth of reproductive activities. In medical science, thyroid disorder will lead to creating thyroiditis and thyroid cancer. The two main thyroid disorders are hyperthyroidism and hypothyroidism. Many research works focus on the prediction of thyroid disorder. To improve the accuracy in the classification of thyroid disorder this paper proposes optimization-based feature selection by using differential evolution with the Butterfly optimization algorithm (DE-BOA). For the classifier fuzzy C-means algorithm (FCM) is used. The proposed DEBOA-FCM is evaluated with parametric metric measures… More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster Head (CH). Then, the data… More >

  • Open Access

    ARTICLE

    Energy Price Forecasting Through Novel Fuzzy Type-1 Membership Functions

    Muhammad Hamza Azam1, Mohd Hilmi Hasan1,*, Azlinda A Malik2, Saima Hassan3, Said Jadid Abdulkadir1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1799-1815, 2022, DOI:10.32604/cmc.2022.028292

    Abstract Electricity price forecasting is a subset of energy and power forecasting that focuses on projecting commercial electricity market present and future prices. Electricity price forecasting have been a critical input to energy corporations’ strategic decision-making systems over the last 15 years. Many strategies have been utilized for price forecasting in the past, however Artificial Intelligence Techniques (Fuzzy Logic and ANN) have proven to be more efficient than traditional techniques (Regression and Time Series). Fuzzy logic is an approach that uses membership functions (MF) and fuzzy inference model to forecast future electricity prices. Fuzzy c-means (FCM) is one of the popular… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the combined feature extraction technique using… More >

Displaying 1-10 on page 1 of 18. Per Page