Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1525-1545, 2024, DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    REVIEW

    Economic Power Dispatching from Distributed Generations: Review of Optimization Techniques

    Paramjeet Kaur1, Krishna Teerth Chaturvedi1, Mohan Lal Kolhe2,*

    Energy Engineering, Vol.121, No.3, pp. 557-579, 2024, DOI:10.32604/ee.2024.043159

    Abstract In the increasingly decentralized energy environment, economical power dispatching from distributed generations (DGs) is crucial to minimizing operating costs, optimizing resource utilization, and guaranteeing a consistent and sustainable supply of electricity. A comprehensive review of optimization techniques for economic power dispatching from distributed generations is imperative to identify the most effective strategies for minimizing operational costs while maintaining grid stability and sustainability. The choice of optimization technique for economic power dispatching from DGs depends on a number of factors, such as the size and complexity of the power system, the availability of computational resources, and the specific requirements of the… More >

  • Open Access

    ARTICLE

    An Optimized Deep Learning Approach for Improving Airline Services

    Shimaa Ouf*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1213-1233, 2023, DOI:10.32604/cmc.2023.034399

    Abstract The aviation industry is one of the most competitive markets. The most common approach for airline service providers is to improve passenger satisfaction. Passenger satisfaction in the aviation industry occurs when passengers’ expectations are met during flights. Airline service quality is critical in attracting new passengers and retaining existing ones. It is crucial to identify passengers’ pain points and enhance their satisfaction with the services offered. The airlines used a variety of techniques to improve service quality. They used data analysis approaches to analyze the passenger point data. These solutions have focused simply on surveys; consequently, deep-learning approaches have received… More >

  • Open Access

    ARTICLE

    Optimization Techniques in University Timetabling Problem: Constraints, Methodologies, Benchmarks, and Open Issues

    Abeer Bashab1, Ashraf Osman Ibrahim2,*, Ibrahim Abakar Tarigo Hashem3, Karan Aggarwal4, Fadhil Mukhlif5, Fuad A. Ghaleb5, Abdelzahir Abdelmaboud6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6461-6484, 2023, DOI:10.32604/cmc.2023.034051

    Abstract University timetabling problems are a yearly challenging task and are faced repeatedly each semester. The problems are considered non-polynomial time (NP) and combinatorial optimization problems (COP), which means that they can be solved through optimization algorithms to produce the aspired optimal timetable. Several techniques have been used to solve university timetabling problems, and most of them use optimization techniques. This paper provides a comprehensive review of the most recent studies dealing with concepts, methodologies, optimization, benchmarks, and open issues of university timetabling problems. The comprehensive review starts by presenting the essence of university timetabling as NP-COP, defining and clarifying the… More >

  • Open Access

    ARTICLE

    Enhanced Cuckoo Search Optimization Technique for Skin Cancer Diagnosis Application

    S. Ayshwarya Lakshmi1,*, K. Anandavelu2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3403-3413, 2023, DOI:10.32604/iasc.2023.030970

    Abstract Skin cancer segmentation is a critical task in a clinical decision support system for skin cancer detection. The suggested enhanced cuckoo search based optimization model will be used to evaluate several metrics in the skin cancer picture segmentation process. Because time and resources are always limited, the proposed enhanced cuckoo search optimization algorithm is one of the most effective strategies for dealing with global optimization difficulties. One of the most significant requirements is to design optimal solutions to optimize their use. There is no particular technique that can answer all optimization issues. The proposed enhanced cuckoo search optimization method indicates… More >

  • Open Access

    ARTICLE

    Chaotic Pigeon Inspired Optimization Technique for Clustered Wireless Sensor Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Sami Dhahbi3, Dalia H. Elkamchouchi4, Jaber S. Alzahrani5, Mrim M. Alnfiai6, Amira Sayed A. Aziz7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6547-6561, 2022, DOI:10.32604/cmc.2022.031660

    Abstract Wireless Sensor Networks (WSN) interlink numerous Sensor Nodes (SN) to support Internet of Things (loT) services. But the data gathered from SNs can be divulged, tempered, and forged. Conventional WSN data processes manage the data in a centralized format at terminal gadgets. These devices are prone to attacks and the security of systems can get compromised. Blockchain is a distributed and decentralized technique that has the ability to handle security issues in WSN. The security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network system. This breaches the mutual trust and allows data… More >

  • Open Access

    ARTICLE

    Optimization of Head Cluster Selection in WSN by Human-Based Optimization Techniques

    Hajer Faris1, Musaria Karim Mahmood2, Osama Ahmad Alomari3,*, Ashraf Elnagar4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5643-5661, 2022, DOI:10.32604/cmc.2022.026228

    Abstract Wireless sensor networks (WSNs) are characterized by their ability to monitor physical or chemical phenomena in a static or dynamic location by collecting data, and transmit it in a collaborative manner to one or more processing centers wirelessly using a routing protocol. Energy dissipation is one of the most challenging issues due to the limited power supply at the sensor node. All routing protocols are large consumers of energy, as they represent the main source of energy cost through data exchange operation. Cluster-based hierarchical routing algorithms are known for their good performance in energy conservation during active data exchange in… More >

  • Open Access

    ARTICLE

    Data Offloading in the Internet of Vehicles Using a Hybrid Optimization Technique

    A. Backia Abinaya1,*, G. Karthikeyan2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 325-338, 2022, DOI:10.32604/iasc.2022.020896

    Abstract The Internet of Vehicles (IoV) is utilized for collecting enormous real time information driven traffics and alert drivers depending on situations. In recent times, all smart vehicles are developed with IoT devices. These devices communicate with a radio access unit (RAU) at road side. Moreover, a 5G system is equipped with a base station and connection interfaces that use optic fiber for their effective communication. For a fast mode of communication, the IoV must offload its data to the nearest edge nodes. The main problem with the IoV is that it generates enormous data which is offloaded randomly during the… More >

  • Open Access

    ARTICLE

    Energy Theft Identification Using Adaboost Ensembler in the Smart Grids

    Muhammad Irfan1,*, Nasir Ayub2, Faisal Althobiani3, Zain Ali4, Muhammad Idrees5, Saeed Ullah2, Saifur Rahman1, Abdullah Saeed Alwadie1, Saleh Mohammed Ghonaim3, Hesham Abdushkour3, Fahad Salem Alkahtani1, Samar Alqhtani6, Piotr Gas7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2141-2158, 2022, DOI:10.32604/cmc.2022.025466

    Abstract One of the major concerns for the utilities in the Smart Grid (SG) is electricity theft. With the implementation of smart meters, the frequency of energy usage and data collection from smart homes has increased, which makes it possible for advanced data analysis that was not previously possible. For this purpose, we have taken historical data of energy thieves and normal users. To avoid imbalance observation, biased estimates, we applied the interpolation method. Furthermore, the data unbalancing issue is resolved in this paper by Nearmiss undersampling technique and makes the data suitable for further processing. By proposing an improved version… More >

  • Open Access

    ARTICLE

    Efficient Approach for Resource Allocation in WPCN Using Hybrid Optimization

    Richu Mary Thomas, Malarvizhi Subramani*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1275-1291, 2022, DOI:10.32604/cmc.2022.024507

    Abstract The recent aggrandizement of radio frequency (RF) signals in wireless power transmission combined with energy harvesting methods have led to the replacement of traditional battery-powered wireless networks since the blooming RF technology provides energy renewal of wireless devices with the quality of service (QoS). In addition, it does not require any unnecessary alterations on the transmission hardware side. A hybridized global optimization technique uniting Global best and Local best (GL) based particle swarm optimization (PSO) and ant colony optimization (ACO) is proposed in this paper to optimally allocate resources in wireless powered communication networks (WPCN) through coordinated operation of communication… More >

Displaying 1-10 on page 1 of 15. Per Page