Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (134)
  • Open Access


    Improved Chameleon Swarm Optimization-Based Load Scheduling for IoT-Enabled Cloud Environment

    Manar Ahmed Hamza1,*, Shaha Al-Otaibi2, Sami Althahabi3, Jaber S. Alzahrani4, Abdullah Mohamed5, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mohamed I. Eldesouki6

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1371-1383, 2023, DOI:10.32604/csse.2023.030232

    Abstract Internet of things (IoT) and cloud computing (CC) becomes widespread in different application domains such as business, e-commerce, healthcare, etc. The recent developments of IoT technology have led to an increase in large amounts of data from various sources. In IoT enabled cloud environment, load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization. The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics. In this view, this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling (C3SOA-LS) technique for… More >

  • Open Access


    Blood Vessel Segmentation with Classification Model for Diabetic Retinopathy Screening

    Abdullah O. Alamoudi1,*, Sarah Mohammed Allabun2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2265-2281, 2023, DOI:10.32604/cmc.2023.032429

    Abstract Biomedical image processing is finding useful in healthcare sector for the investigation, enhancement, and display of images gathered by distinct imaging technologies. Diabetic retinopathy (DR) is an illness caused by diabetes complications and leads to irreversible injury to the retina blood vessels. Retinal vessel segmentation techniques are a basic element of automated retinal disease screening system. In this view, this study presents a novel blood vessel segmentation with deep learning based classification (BVS-DLC) model for DR diagnosis using retinal fundus images. The proposed BVS-DLC model involves different stages of operations such as preprocessing, segmentation, feature… More >

  • Open Access


    Chaotic Metaheuristics with Multi-Spiking Neural Network Based Cloud Intrusion Detection

    Mohammad Yamin1,*, Saleh Bajaba2, Zenah Mahmoud AlKubaisy1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6101-6118, 2023, DOI:10.32604/cmc.2023.033677

    Abstract Cloud Computing (CC) provides data storage options as well as computing services to its users through the Internet. On the other hand, cloud users are concerned about security and privacy issues due to the increased number of cyberattacks. Data protection has become an important issue since the users’ information gets exposed to third parties. Computer networks are exposed to different types of attacks which have extensively grown in addition to the novel intrusion methods and hacking tools. Intrusion Detection Systems (IDSs) can be used in a network to manage suspicious activities. These IDSs monitor the… More >

  • Open Access


    Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud Environment

    Fatma S. Alrayes1, Nuha Alshuqayran2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Abdullah Mohamed5, Amgad Atta Abdelmageed Mohammed6, Gouse Pasha Mohammed6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6737-6753, 2023, DOI:10.32604/cmc.2023.032591

    Abstract Recently, Internet of Things (IoT) devices have developed at a faster rate and utilization of devices gets considerably increased in day to day lives. Despite the benefits of IoT devices, security issues remain challenging owing to the fact that most devices do not include memory and computing resources essential for satisfactory security operation. Consequently, IoT devices are vulnerable to different kinds of attacks. A single attack on networking system/device could result in considerable data to data security and privacy. But the emergence of artificial intelligence (AI) techniques can be exploited for attack detection and classification… More >

  • Open Access


    Al-Biruni Earth Radius (BER) Metaheuristic Search Optimization Algorithm

    El-Sayed M. El-kenawy1,2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Seyedali Mirjalili6,7, Nima Khodadad8, Mona A. Al duailij9, Amel Ali Alhussan9,*, Doaa Sami Khafaga9

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1917-1934, 2023, DOI:10.32604/csse.2023.032497

    Abstract Metaheuristic optimization algorithms present an effective method for solving several optimization problems from various types of applications and fields. Several metaheuristics and evolutionary optimization algorithms have been emerged recently in the literature and gained widespread attention, such as particle swarm optimization (PSO), whale optimization algorithm (WOA), grey wolf optimization algorithm (GWO), genetic algorithm (GA), and gravitational search algorithm (GSA). According to the literature, no one metaheuristic optimization algorithm can handle all present optimization problems. Hence novel optimization methodologies are still needed. The Al-Biruni earth radius (BER) search optimization algorithm is proposed in this paper. The More >

  • Open Access


    Dipper Throated Algorithm for Feature Selection and Classification in Electrocardiogram

    Doaa Sami Khafaga1, Amel Ali Alhussan1,*, Abdelaziz A. Abdelhamid2,3, Abdelhameed Ibrahim4, Mohamed Saber5, El-Sayed M. El-kenawy6,7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1469-1482, 2023, DOI:10.32604/csse.2023.031943

    Abstract Arrhythmia has been classified using a variety of methods. Because of the dynamic nature of electrocardiogram (ECG) data, traditional handcrafted approaches are difficult to execute, making the machine learning (ML) solutions more appealing. Patients with cardiac arrhythmias can benefit from competent monitoring to save their lives. Cardiac arrhythmia classification and prediction have greatly improved in recent years. Arrhythmias are a category of conditions in which the heart's electrical activity is abnormally rapid or sluggish. Every year, it is one of the main reasons of mortality for both men and women, worldwide. For the classification of… More >

  • Open Access


    Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment

    K. Karthikeyan1,*, Liyakathunisa2, Eman Aljohani2, Thavavel Vaiyapuri3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1641-1654, 2023, DOI:10.32604/csse.2023.031582

    Abstract Cloud data centers consume high volume of energy for processing and switching the servers among different modes. Virtual Machine (VM) migration enhances the performance of cloud servers in terms of energy efficiency, internal failures and availability. On the other end, energy utilization can be minimized by decreasing the number of active, underutilized sources which conversely reduces the dependability of the system. In VM migration process, the VMs are migrated from underutilized physical resources to other resources to minimize energy utilization and optimize the operations. In this view, the current study develops an Improved Metaheuristic Based… More >

  • Open Access


    Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model

    Mashael M Asiri1, Heba G. Mohamed2, Mohamed K Nour3, Mesfer Al Duhayyim4,*, Amira Sayed A. Aziz5, Abdelwahed Motwakel6, Abu Sarwar Zamani6, Mohamed I. Eldesouki7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1679-1694, 2023, DOI:10.32604/csse.2023.031063

    Abstract Due to exponential increase in smart resource limited devices and high speed communication technologies, Internet of Things (IoT) have received significant attention in different application areas. However, IoT environment is highly susceptible to cyber-attacks because of memory, processing, and communication restrictions. Since traditional models are not adequate for accomplishing security in the IoT environment, the recent developments of deep learning (DL) models find beneficial. This study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection (HMFS-SDLCAD) model. The major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks… More >

  • Open Access


    Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

    Reem Alkanhel1,*, Doaa Sami Khafaga2, El-Sayed M. El-kenawy3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Rashid Amin7, Mostafa Abotaleb8, B. M. El-den6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2695-2709, 2023, DOI:10.32604/cmc.2023.033153

    Abstract The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That’s why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper… More >

  • Open Access


    Natural Language Processing with Optimal Deep Learning-Enabled Intelligent Image Captioning System

    Radwa Marzouk1, Eatedal Alabdulkreem2, Mohamed K. Nour3, Mesfer Al Duhayyim4,*, Mahmoud Othman5, Abu Sarwar Zamani6, Ishfaq Yaseen6, Abdelwahed Motwakel6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4435-4451, 2023, DOI:10.32604/cmc.2023.033091

    Abstract The recent developments in Multimedia Internet of Things (MIoT) devices, empowered with Natural Language Processing (NLP) model, seem to be a promising future of smart devices. It plays an important role in industrial models such as speech understanding, emotion detection, home automation, and so on. If an image needs to be captioned, then the objects in that image, its actions and connections, and any silent feature that remains under-projected or missing from the images should be identified. The aim of the image captioning process is to generate a caption for image. In next step, the… More >

Displaying 31-40 on page 4 of 134. Per Page