Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (147)
  • Open Access

    ARTICLE

    Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model

    Mashael M Asiri1, Heba G. Mohamed2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Amira Sayed A. Aziz5, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Mohamed I. Eldesouki7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1679-1694, 2023, DOI:10.32604/csse.2023.031063

    Abstract Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention in different application areas. However, IoT environment is highly susceptible to cyber-attacks because of memory, processing, and communication restrictions. Since traditional models are not adequate for accomplishing security in the IoT environment, the recent developments of deep learning (DL) models find beneficial. This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection (HMFS-SDLCAD) model. The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT environment. At… More >

  • Open Access

    ARTICLE

    Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

    Reem Alkanhel1,*, Doaa Sami Khafaga2, El-Sayed M. El-kenawy3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Rashid Amin7, Mostafa Abotaleb8, B. M. El-den6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2695-2709, 2023, DOI:10.32604/cmc.2023.033153

    Abstract The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That’s why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance… More >

  • Open Access

    ARTICLE

    Natural Language Processing with Optimal Deep Learning-Enabled Intelligent Image Captioning System

    Radwa Marzouk1, Eatedal Alabdulkreem2, Mohamed K. Nour3, Mesfer Al Duhayyim4,*, Mahmoud Othman5, Abu Sarwar Zamani6, Ishfaq Yaseen6, Abdelwahed Motwakel6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4435-4451, 2023, DOI:10.32604/cmc.2023.033091

    Abstract The recent developments in Multimedia Internet of Things (MIoT) devices, empowered with Natural Language Processing (NLP) model, seem to be a promising future of smart devices. It plays an important role in industrial models such as speech understanding, emotion detection, home automation, and so on. If an image needs to be captioned, then the objects in that image, its actions and connections, and any silent feature that remains under-projected or missing from the images should be identified. The aim of the image captioning process is to generate a caption for image. In next step, the image should be provided with… More >

  • Open Access

    ARTICLE

    Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,3, Faten Khalid Karim1,*, Mostafa Abotaleb4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, D. L. Elsheweikh8

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4531-4545, 2023, DOI:10.32604/cmc.2023.033042

    Abstract Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine learning. Each feature in a dataset has 2n possible subsets, making it challenging to select the optimum collection of features using typical methods. As a result, a new metaheuristics-based feature selection method based on the dipper-throated and grey-wolf optimization (DTO-GW) algorithms has been developed in this research. Instability can result when the selection of features is subject to metaheuristics, which can lead to a wide range of results. Thus, we adopted hybrid optimization in our method of optimizing, which allowed us… More >

  • Open Access

    ARTICLE

    Novel Optimized Feature Selection Using Metaheuristics Applied to Physical Benchmark Datasets

    Doaa Sami Khafaga1, El-Sayed M. El-kenawy2, Fadwa Alrowais1,*, Sunil Kumar3, Abdelhameed Ibrahim4, Abdelaziz A. Abdelhamid5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4027-4041, 2023, DOI:10.32604/cmc.2023.033039

    Abstract In data mining and machine learning, feature selection is a critical part of the process of selecting the optimal subset of features based on the target data. There are 2n potential feature subsets for every n features in a dataset, making it difficult to pick the best set of features using standard approaches. Consequently, in this research, a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm (ASSOA) has been proposed. When using metaheuristics to pick features, it is common for the selection of features to vary across runs, which can lead to instability. Because of… More >

  • Open Access

    ARTICLE

    Data Mining with Comprehensive Oppositional Based Learning for Rainfall Prediction

    Mohammad Alamgeer1, Amal Al-Rasheed2, Ahmad Alhindi3, Manar Ahmed Hamza4,*, Abdelwahed Motwakel4, Mohamed I. Eldesouki5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2725-2738, 2023, DOI:10.32604/cmc.2023.029163

    Abstract Data mining process involves a number of steps from data collection to visualization to identify useful data from massive data set. the same time, the recent advances of machine learning (ML) and deep learning (DL) models can be utilized for effectual rainfall prediction. With this motivation, this article develops a novel comprehensive oppositional moth flame optimization with deep learning for rainfall prediction (COMFO-DLRP) Technique. The proposed CMFO-DLRP model mainly intends to predict the rainfall and thereby determine the environmental changes. Primarily, data pre-processing and correlation matrix (CM) based feature selection processes are carried out. In addition, deep belief network (DBN)… More >

  • Open Access

    ARTICLE

    Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks

    M. V. Rajesh1, T. Archana Acharya2, Hafis Hajiyev3, E. Laxmi Lydia4, Haya Mesfer Alshahrani5, Mohamed K Nour6, Abdullah Mohamed7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 933-949, 2023, DOI:10.32604/cmc.2023.032549

    Abstract Recently, Internet of Things (IoT) has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track applications. Wireless sensor network (WSN) is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management, intelligent transportation, home automation, smart buildings, and other such IoT-based application. The routing approaches were extremely-utilized energy efficient approaches with an initial drive that is, for balancing the energy amongst sensor nodes. The clustering and routing procedures… More >

  • Open Access

    ARTICLE

    Metaheuristics-based Clustering with Routing Technique for Lifetime Maximization in Vehicular Networks

    P. Muthukrishnan*, P. Muthu Kannan

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1107-1122, 2023, DOI:10.32604/cmc.2023.031962

    Abstract Recently, vehicular ad hoc networks (VANETs) finds applicability in different domains such as security, rescue operations, intelligent transportation systems (ITS), etc. VANET has unique features like high mobility, limited mobility patterns, adequate topology modifications, and wireless communication. Despite the benefits of VANET, scalability is a challenging issue which could be addressed by the use of cluster-based routing techniques. It enables the vehicles to perform intercluster communication via chosen CHs and optimal routes. The main drawback of VANET network is the network unsteadiness that results in minimum lifetime. In order to avoid reduced network lifetime in VANET, this paper presents an… More >

  • Open Access

    ARTICLE

    Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Mohamed K. Nour4, Mashael M. Asiri5, Ali M. Al-Sharafi6, Mahmoud Othman7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 607-621, 2023, DOI:10.32604/cmc.2023.031371

    Abstract Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. These attacks hijack huge quantities of the available data, incurring heavy financial loss. At the same time, Machine Learning (ML) and Deep Learning (DL) models paved the way for designing models that can detect malicious URLs accurately and classify them. With this motivation,… More >

  • Open Access

    ARTICLE

    Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection

    Mazen Mushabab Alqahtani1, Ashit Kumar Dutta2, Sultan Almotairi3, M. Ilayaraja4, Amani Abdulrahman Albraikan5, Fahd N. Al-Wesabi6,7,*, Mesfer Al Duhayyim8

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 217-233, 2023, DOI:10.32604/cmc.2023.025280

    Abstract Recent developments in digital cameras and electronic gadgets coupled with Machine Learning (ML) and Deep Learning (DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models. In this background, the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection (ESFO-EALD) model. The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically. In this scenario, Median Filtering (MF) approach is utilized to boost the quality of apple plant leaf images. Moreover, SFO with Kapur's entropy-based segmentation technique is also utilized for the… More >

Displaying 41-50 on page 5 of 147. Per Page