Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this motivation, the study presents a… More >

  • Open Access

    ARTICLE

    HybridHR-Net: Action Recognition in Video Sequences Using Optimal Deep Learning Fusion Assisted Framework

    Muhammad Naeem Akbar1,*, Seemab Khan2, Muhammad Umar Farooq1, Majed Alhaisoni3, Usman Tariq4, Muhammad Usman Akram1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3275-3295, 2023, DOI:10.32604/cmc.2023.039289

    Abstract The combination of spatiotemporal videos and essential features can improve the performance of human action recognition (HAR); however, the individual type of features usually degrades the performance due to similar actions and complex backgrounds. The deep convolutional neural network has improved performance in recent years for several computer vision applications due to its spatial information. This article proposes a new framework called for video surveillance human action recognition dubbed HybridHR-Net. On a few selected datasets, deep transfer learning is used to pre-trained the EfficientNet-b0 deep learning model. Bayesian optimization is employed for the tuning of hyperparameters of the fine-tuned deep… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Based Ransomware Detection and Classification in the Internet of Things Environment

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3087-3102, 2023, DOI:10.32604/csse.2023.036802

    Abstract With the advent of the Internet of Things (IoT), several devices like sensors nowadays can interact and easily share information. But the IoT model is prone to security concerns as several attackers try to hit the network and make it vulnerable. In such scenarios, security concern is the most prominent. Different models were intended to address these security problems; still, several emergent variants of botnet attacks like Bashlite, Mirai, and Persirai use security breaches. The malware classification and detection in the IoT model is still a problem, as the adversary reliably generates a new variant of IoT malware and actively… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment

    Khaled M. Alalayah1, Fatma S. Alrayes2, Jaber S. Alzahrani3, Khadija M. Alaidarous1, Ibrahim M. Alwayle1, Heba Mohsen4, Ibrahim Abdulrab Ahmed5, Mesfer Al Duhayyim6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3121-3139, 2023, DOI:10.32604/csse.2023.036352

    Abstract With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL)… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176

    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed to secure the SDN-enabled IoT… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0

    Khalid A. Alissa1, Mohammed Maray2, Areej A. Malibari3, Sana Alazwari4, Hamed Alqahtani5, Mohamed K. Nour6, Marwa Obbaya7, Mohamed A. Shamseldin8, Mesfer Al Duhayyim9,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5349-5367, 2023, DOI:10.32604/cmc.2023.033532

    Abstract Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image… More >

  • Open Access

    ARTICLE

    Natural Language Processing with Optimal Deep Learning-Enabled Intelligent Image Captioning System

    Radwa Marzouk1, Eatedal Alabdulkreem2, Mohamed K. Nour3, Mesfer Al Duhayyim4,*, Mahmoud Othman5, Abu Sarwar Zamani6, Ishfaq Yaseen6, Abdelwahed Motwakel6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4435-4451, 2023, DOI:10.32604/cmc.2023.033091

    Abstract The recent developments in Multimedia Internet of Things (MIoT) devices, empowered with Natural Language Processing (NLP) model, seem to be a promising future of smart devices. It plays an important role in industrial models such as speech understanding, emotion detection, home automation, and so on. If an image needs to be captioned, then the objects in that image, its actions and connections, and any silent feature that remains under-projected or missing from the images should be identified. The aim of the image captioning process is to generate a caption for image. In next step, the image should be provided with… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles

    Anwer Mustafa Hilal1,*, Jaber S. Alzahrani2, Dalia H. Elkamchouchi3, Majdy M. Eltahir4, Ahmed S. Almasoud5, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Ishfaq Yaseen1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 955-969, 2023, DOI:10.32604/csse.2023.030132

    Abstract Recently, unmanned aerial vehicles (UAV) or drones are widely employed for several application areas such as surveillance, disaster management, etc. Since UAVs are limited to energy, efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station (BS). Therefore, clustering can be employed as an effective way of accomplishing smart communication systems among multiple UAVs. In this aspect, this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system (GTOADL-SCS) technique for UAV networks. The proposed GTOADL-SCS model encompasses a two stage process namely clustering and classification. At… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain with Optimal Deep Learning Model for Smart Cities

    K. Pradeep Mohan Kumar1, Jenifer Mahilraj2, D. Swathi3, R. Rajavarman4, Subhi R. M. Zeebaree5, Rizgar R. Zebari6, Zryan Najat Rashid7, Ahmed Alkhayyat8,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5299-5314, 2022, DOI:10.32604/cmc.2022.030825

    Abstract Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish security in this scenario. Besides, blockchain exhibits significance in promoting smart city designing, due to its effective characteristics like immutability, transparency, and decentralization. In order to address the security problems in smart cities, the current study designs a Privacy Preserving Secure Framework using Blockchain with Optimal Deep Learning (PPSF-BODL) model. The… More >

  • Open Access

    ARTICLE

    Modeling of Optimal Deep Learning Based Flood Forecasting Model Using Twitter Data

    G. Indra1,*, N. Duraipandian2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1455-1470, 2023, DOI:10.32604/iasc.2023.027703

    Abstract A flood is a significant damaging natural calamity that causes loss of life and property. Earlier work on the construction of flood prediction models intended to reduce risks, suggest policies, reduce mortality, and limit property damage caused by floods. The massive amount of data generated by social media platforms such as Twitter opens the door to flood analysis. Because of the real-time nature of Twitter data, some government agencies and authorities have used it to track natural catastrophe events in order to build a more rapid rescue strategy. However, due to the shorter duration of Tweets, it is difficult to… More >

Displaying 1-10 on page 1 of 21. Per Page