Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (341)
  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used. b) A new technique based… More >

  • Open Access

    ARTICLE

    An Efficient Memory Management for Mobile Operating Systems Based on Prediction of Relaunch Distance

    Jaehwan Lee1, Sangoh Park2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 171-186, 2023, DOI:10.32604/csse.2023.038139

    Abstract Recently, various mobile apps have included more features to improve user convenience. Mobile operating systems load as many apps into memory for faster app launching and execution. The least recently used (LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low. However, the LRU-based cached app termination does not distinguish between frequently or infrequently used apps. The app launch performance degrades if LRU terminates frequently used apps. Recent studies have suggested the potential of using users’ app usage patterns to predict the next app launch and address the limitations of… More >

  • Open Access

    ARTICLE

    HSPM: A Better Model to Effectively Preventing Open-Source Projects from Dying

    Zhifang Liao1, Fangying Fu1, Yiqi Zhao1, Sui Tan2,3,*, Zhiwu Yu2,3, Yan Zhang4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 431-452, 2023, DOI:10.32604/csse.2023.038087

    Abstract With the rapid development of Open-Source (OS), more and more software projects are maintained and developed in the form of OS. These Open-Source projects depend on and influence each other, gradually forming a huge OS project network, namely an Open-Source Software ECOsystem (OSSECO). Unfortunately, not all OS projects in the open-source ecosystem can be healthy and stable in the long term, and more projects will go from active to inactive and gradually die. In a tightly connected ecosystem, the death of one project can potentially cause the collapse of the entire ecosystem network. How can we effectively prevent such situations… More >

  • Open Access

    ARTICLE

    COVID TCL: A Joint Metric Loss Function for Diagnosing COVID-19 Patient in the Early and Incubation Period

    Rui Wen1,*, Jie Zhou2, Zhongliang Shen1, Xiaorui Zhang2,3,4, Sunil Kumar Jha5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 187-204, 2023, DOI:10.32604/csse.2023.037889

    Abstract Convolution Neural Networks (CNN) can quickly diagnose COVID-19 patients by analyzing computed tomography (CT) images of the lung, thereby effectively preventing the spread of COVID-19. However, the existing CNN-based COVID-19 diagnosis models do consider the problem that the lung images of COVID-19 patients in the early stage and incubation period are extremely similar to those of the non-COVID-19 population. Which reduces the model’s classification sensitivity, resulting in a higher probability of the model misdiagnosing COVID-19 patients as non-COVID-19 people. To solve the problem, this paper first attempts to apply triplet loss and center loss to the field of COVID-19 image… More >

  • Open Access

    ARTICLE

    Modeling & Evaluating the Performance of Convolutional Neural Networks for Classifying Steel Surface Defects

    Nadeem Jabbar Chaudhry1,*, M. Bilal Khan2, M. Javaid Iqbal1, Siddiqui Muhammad Yasir3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 245-259, 2022, DOI:10.32604/jai.2022.038875

    Abstract Recently, outstanding identification rates in image classification tasks were achieved by convolutional neural networks (CNNs). to use such skills, selective CNNs trained on a dataset of well-known images of metal surface defects captured with an RGB camera. Defects must be detected early to take timely corrective action due to production concerns. For image classification up till now, a model-based method has been utilized, which indicated the predicted reflection characteristics of surface defects in comparison to flaw-free surfaces. The problem of detecting steel surface defects has grown in importance as a result of the vast range of steel applications in end-product… More >

  • Open Access

    ARTICLE

    ResCD-FCN: Semantic Scene Change Detection Using Deep Neural Networks

    S. Eliza Femi Sherley1,*, J. M. Karthikeyan1, N. Bharath Raj1, R. Prabakaran2, A. Abinaya1, S. V. V. Lakshmi3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 215-227, 2022, DOI:10.32604/jai.2022.034931

    Abstract Semantic change detection is extension of change detection task in which it is not only used to identify the changed regions but also to analyze the land area semantic (labels/categories) details before and after the timelines are analyzed. Periodical land change analysis is used for many real time applications for valuation purposes. Majority of the research works are focused on Convolutional Neural Networks (CNN) which tries to analyze changes alone. Semantic information of changes appears to be missing, there by absence of communication between the different semantic timelines and changes detected over the region happens. To overcome this limitation, a… More >

  • Open Access

    ARTICLE

    Mobile Communication Voice Enhancement Under Convolutional Neural Networks and the Internet of Things

    Jiajia Yu*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 777-797, 2023, DOI:10.32604/iasc.2023.037354

    Abstract This study aims to reduce the interference of ambient noise in mobile communication, improve the accuracy and authenticity of information transmitted by sound, and guarantee the accuracy of voice information delivered by mobile communication. First, the principles and techniques of speech enhancement are analyzed, and a fast lateral recursive least square method (FLRLS method) is adopted to process sound data. Then, the convolutional neural networks (CNNs)-based noise recognition CNN (NR-CNN) algorithm and speech enhancement model are proposed. Finally, related experiments are designed to verify the performance of the proposed algorithm and model. The experimental results show that the noise classification… More >

  • Open Access

    ARTICLE

    Acknowledge of Emotions for Improving Student-Robot Interaction

    Hasan Han1, Oguzcan Karadeniz1, Tugba Dalyan2,*, Elena Battini Sonmez2, Baykal Sarioglu1

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1209-1224, 2023, DOI:10.32604/iasc.2023.030674

    Abstract Robot companions will soon be part of our everyday life and students in the engineering faculty must be trained to design, build, and interact with them. The two affordable robots presented in this paper have been designed and constructed by two undergraduate students; one artificial agent is based on the Nvidia Jetson Nano development board and the other one on a remote computer system. Moreover, the robots have been refined with an empathetic system, to make them more user-friendly. Since automatic facial expression recognition skills is a necessary pre-processing step for acknowledging emotions, this paper tested different variations of Convolutional… More >

  • Open Access

    ARTICLE

    Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 265-298, 2023, DOI:10.32604/cmes.2023.027581

    Abstract Due to the increasing number of cyber-attacks, the necessity to develop efficient intrusion detection systems (IDS) is more imperative than ever. In IDS research, the most effectively used methodology is based on supervised Neural Networks (NN) and unsupervised clustering, but there are few works dedicated to their hybridization with metaheuristic algorithms. As intrusion detection data usually contains several features, it is essential to select the best ones appropriately. Linear Discriminant Analysis (LDA) and t-statistic are considered as efficient conventional techniques to select the best features, but they have been little exploited in IDS design. Thus, the research proposed in this… More >

  • Open Access

    REVIEW

    Heterogeneous Network Embedding: A Survey

    Sufen Zhao1,2, Rong Peng1,*, Po Hu2, Liansheng Tan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 83-130, 2023, DOI:10.32604/cmes.2023.024781

    Abstract Real-world complex networks are inherently heterogeneous; they have different types of nodes, attributes, and relationships. In recent years, various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks (HINs) into low-dimensional embeddings; this task is called heterogeneous network embedding (HNE). Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification, recommender systems, and information retrieval. Here, we provide a comprehensive survey of key advancements in the area of HNE. First, we define an encoder-decoder-based HNE model taxonomy. Then, we systematically overview, compare, and summarize various… More > Graphic Abstract

    Heterogeneous Network Embedding: A Survey

Displaying 61-70 on page 7 of 341. Per Page