Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    Hybrid Deep Learning-Based Adaptive Multiple Access Schemes Underwater Wireless Networks

    D. Anitha1,*, R. A. Karthika2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2463-2477, 2023, DOI:10.32604/iasc.2023.023361 - 19 July 2022

    Abstract Achieving sound communication systems in Under Water Acoustic (UWA) environment remains challenging for researchers. The communication scheme is complex since these acoustic channels exhibit uneven characteristics such as long propagation delay and irregular Doppler shifts. The development of machine and deep learning algorithms has reduced the burden of achieving reliable and good communication schemes in the underwater acoustic environment. This paper proposes a novel intelligent selection method between the different modulation schemes such as Code Division Multiple Access(CDMA), Time Division Multiple Access(TDMA), and Orthogonal Frequency Division Multiplexing(OFDM) techniques using the hybrid combination of the convolutional More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification

    Rasha Almarshdi1,2,*, Laila Nassef1, Etimad Fadel1, Nahed Alowidi1

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 297-320, 2023, DOI:10.32604/iasc.2023.026799 - 06 June 2022

    Abstract Internet of Things (IoT) is the most widespread and fastest growing technology today. Due to the increasing of IoT devices connected to the Internet, the IoT is the most technology under security attacks. The IoT devices are not designed with security because they are resource constrained devices. Therefore, having an accurate IoT security system to detect security attacks is challenging. Intrusion Detection Systems (IDSs) using machine learning and deep learning techniques can detect security attacks accurately. This paper develops an IDS architecture based on Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM) deep learning… More >

  • Open Access

    ARTICLE

    Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model

    Hadil Shaiba1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Radwa Marzouk4, Heba Mohsen5, Manar Ahmed Hamza6,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6425-6441, 2022, DOI:10.32604/cmc.2022.031625 - 28 July 2022

    Abstract Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords, account identifiers, bank details, etc. In general, these kinds of cyberattacks are made at users through phone calls, emails, or instant messages. The anti-phishing techniques, currently under use, are mainly based on source code features that need to scrape the webpage content. In third party services, these techniques check the classification procedure of phishing Uniform Resource Locators (URLs). Even though Machine Learning (ML) techniques have been lately utilized in the identification of phishing, they still need… More >

  • Open Access

    ARTICLE

    HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework

    Magdy M. Fadel1,*, Sally M. El-Ghamrawy2, Amr M. T. Ali-Eldin1, Mohammed K. Hassan3, Ali I. El-Desoky1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2293-2312, 2022, DOI:10.32604/cmc.2022.028287 - 16 June 2022

    Abstract Distributed denial-of-service (DDoS) attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks. Furthermore, the enormous number of connected devices makes it difficult to operate such a network effectively. Software defined networks (SDN) are networks that are managed through a centralized control system, according to researchers. This controller is the brain of any SDN, composing the forwarding table of all data plane network switches. Despite the advantages of SDN controllers, DDoS attacks are easier to perpetrate than on traditional networks. Because the controller is a single point of More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Intrusion Detection in Clustered IIoT Environment

    Radwa Marzouk1, Fadwa Alrowais2, Noha Negm3, Mimouna Abdullah Alkhonaini4, Manar Ahmed Hamza5,*, Mohammed Rizwanullah5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3763-3775, 2022, DOI:10.32604/cmc.2022.027483 - 29 March 2022

    Abstract Industrial Internet of Things (IIoT) is an emerging field which connects digital equipment as well as services to physical systems. Intrusion detection systems (IDS) can be designed to protect the system from intrusions or attacks. In this view, this paper presents a novel hybrid deep learning with metaheuristics enabled intrusion detection (HDL-MEID) technique for clustered IIoT environments. The HDL-MEID model mainly intends to organize the IIoT devices into clusters and enabled secure communication. Primarily, the HDL-MEID technique designs a new chaotic mayfly optimization (CMFO) based clustering approach for the effective choice of the Cluster Heads More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Enabled Air Pollution Monitoring in ITS Environment

    Ashit Kumar Dutta1, Jenyfal Sampson2, Sultan Ahmad3, T. Avudaiappan4, Kanagaraj Narayanasamy5,*, Irina V. Pustokhina6, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1157-1172, 2022, DOI:10.32604/cmc.2022.024109 - 24 February 2022

    Abstract Intelligent Transportation Systems (ITS) have become a vital part in improving human lives and modern economy. It aims at enhancing road safety and environmental quality. There is a tremendous increase observed in the number of vehicles in recent years, owing to increasing population. Each vehicle has its own individual emission rate; however, the issue arises when the emission rate crosses a standard value. Owing to the technological advances made in Artificial Intelligence (AI) techniques, it is easy to leverage it to develop prediction approaches so as to monitor and control air pollution. The current research… More >

  • Open Access

    ARTICLE

    Facial Action Coding and Hybrid Deep Learning Architectures for Autism Detection

    A. Saranya1,*, R. Anandan2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1167-1182, 2022, DOI:10.32604/iasc.2022.023445 - 08 February 2022

    Abstract Hereditary Autism Spectrum Disorder (ASD) is a neuron disorder that affects a person's ability for communication, interaction, and also behaviors. Diagnostics of autism are available throughout all stages of life, from infancy through adolescence and adulthood. Facial Emotions detection is considered to be the most parameter for the detection of Autismdisorders among the different categories of people. Propelled with a machine and deep learning algorithms, detection of autism disorder using facial emotions has reached a new dimension and has even been considered as the precautionary warning system for caregivers. Since Facial emotions are limited to… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Deep Learning Framework for Intrusion Detection Systems in WSN-IoT Networks

    M. Maheswari1,2,*, R. A. Karthika1

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 365-382, 2022, DOI:10.32604/iasc.2022.022259 - 05 January 2022

    Abstract With the advent of wireless communication and digital technology, low power, Internet-enabled, and reconfigurable wireless devices have been developed, which revolutionized day-to-day human life and the economy across the globe. These devices are realized by leveraging the features of sensing, processing the data and nodes communications. The scale of Internet-enabled wireless devices has increased daily, and these devices are exposed to various cyber-attacks. Since the complexity and dynamics of the attacks on the devices are computationally high, intelligent, scalable and high-speed intrusion detection systems (IDS) are required. Moreover, the wireless devices are battery-driven; implementing them… More >

  • Open Access

    ARTICLE

    Hybrid Deep Learning Framework for Privacy Preservation in Geo-Distributed Data Centre

    S. Nithyanantham1,*, G. Singaravel2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1905-1919, 2022, DOI:10.32604/iasc.2022.022499 - 09 December 2021

    Abstract In recent times, a huge amount of data is being created from different sources and the size of the data generated on the Internet has already surpassed two Exabytes. Big Data processing and analysis can be employed in many disciplines which can aid the decision-making process with privacy preservation of users’ private data. To store large quantity of data, Geo-Distributed Data Centres (GDDC) are developed. In recent times, several applications comprising data analytics and machine learning have been designed for GDDC. In this view, this paper presents a hybrid deep learning framework for privacy preservation… More >

  • Open Access

    ARTICLE

    Heart Disease Classification Using Multiple K-PCA and Hybrid Deep Learning Approach

    S. Kusuma*, Dr. Jothi K. R

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1273-1289, 2022, DOI:10.32604/csse.2022.021741 - 10 November 2021

    Abstract One of the severe health problems and the most common types of heart disease (HD) is Coronary heart disease (CHD). Due to the lack of a healthy lifestyle, HD would cause frequent mortality worldwide. If the heart attack occurs without any symptoms, it cannot be cured by an intelligent detection system. An effective diagnosis and detection of CHD should prevent human casualties. Moreover, intelligent systems employ clinical-based decision support approaches to assist physicians in providing another option for diagnosing and detecting HD. This paper aims to introduce a heart disease prediction model including phases like… More >

Displaying 41-50 on page 5 of 60. Per Page