Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (667)
  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order… More >

  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1525-1545, 2024, DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    ARTICLE

    Machine Learning Techniques Using Deep Instinctive Encoder-Based Feature Extraction for Optimized Breast Cancer Detection

    Vaishnawi Priyadarshni1, Sanjay Kumar Sharma1, Mohammad Khalid Imam Rahmani2,*, Baijnath Kaushik3, Rania Almajalid2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2441-2468, 2024, DOI:10.32604/cmc.2024.044963

    Abstract Breast cancer (BC) is one of the leading causes of death among women worldwide, as it has emerged as the most commonly diagnosed malignancy in women. Early detection and effective treatment of BC can help save women’s lives. Developing an efficient technology-based detection system can lead to non-destructive and preliminary cancer detection techniques. This paper proposes a comprehensive framework that can effectively diagnose cancerous cells from benign cells using the Curated Breast Imaging Subset of the Digital Database for Screening Mammography (CBIS-DDSM) data set. The novelty of the proposed framework lies in the integration of various techniques, where the fusion… More >

  • Open Access

    REVIEW

    Economic Power Dispatching from Distributed Generations: Review of Optimization Techniques

    Paramjeet Kaur1, Krishna Teerth Chaturvedi1, Mohan Lal Kolhe2,*

    Energy Engineering, Vol.121, No.3, pp. 557-579, 2024, DOI:10.32604/ee.2024.043159

    Abstract In the increasingly decentralized energy environment, economical power dispatching from distributed generations (DGs) is crucial to minimizing operating costs, optimizing resource utilization, and guaranteeing a consistent and sustainable supply of electricity. A comprehensive review of optimization techniques for economic power dispatching from distributed generations is imperative to identify the most effective strategies for minimizing operational costs while maintaining grid stability and sustainability. The choice of optimization technique for economic power dispatching from DGs depends on a number of factors, such as the size and complexity of the power system, the availability of computational resources, and the specific requirements of the… More >

  • Open Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1423-1442, 2024, DOI:10.32604/cmc.2023.046149

    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining the video’s visual quality.… More >

  • Open Access

    ARTICLE

    Image Inpainting Technique Incorporating Edge Prior and Attention Mechanism

    Jinxian Bai, Yao Fan*, Zhiwei Zhao, Lizhi Zheng

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 999-1025, 2024, DOI:10.32604/cmc.2023.044612

    Abstract Recently, deep learning-based image inpainting methods have made great strides in reconstructing damaged regions. However, these methods often struggle to produce satisfactory results when dealing with missing images with large holes, leading to distortions in the structure and blurring of textures. To address these problems, we combine the advantages of transformers and convolutions to propose an image inpainting method that incorporates edge priors and attention mechanisms. The proposed method aims to improve the results of inpainting large holes in images by enhancing the accuracy of structure restoration and the ability to recover texture details. This method divides the inpainting task… More >

  • Open Access

    REVIEW

    Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques: A Comprehensive Review and Open Challenges

    Samina Amin1, Muhammad Ali Zeb1, Hani Alshahrani2,*, Mohammed Hamdi2, Mohammad Alsulami2, Asadullah Shaikh3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1167-1202, 2024, DOI:10.32604/cmes.2023.043921

    Abstract Social media (SM) based surveillance systems, combined with machine learning (ML) and deep learning (DL) techniques, have shown potential for early detection of epidemic outbreaks. This review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their performance. Since, every year, a large amount of data related to epidemic outbreaks, particularly Twitter data is generated by SM. This paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM, along with the ML and DL techniques that have been configured for the… More >

  • Open Access

    ARTICLE

    A Performance Analysis of Machine Learning Techniques for Credit Card Fraud Detection

    Ayesha Aslam1, Adil Hussain2,*

    Journal on Artificial Intelligence, Vol.6, pp. 1-21, 2024, DOI:10.32604/jai.2024.047226

    Abstract With the increased accessibility of global trade information, transaction fraud has become a major worry in global banking and commerce security. The incidence and magnitude of transaction fraud are increasing daily, resulting in significant financial losses for both customers and financial professionals. With improvements in data mining and machine learning in computer science, the capacity to detect transaction fraud is becoming increasingly attainable. The primary goal of this research is to undertake a comparative examination of cutting-edge machine-learning algorithms developed to detect credit card fraud. The research looks at the efficacy of these machine learning algorithms using a publicly available… More >

  • Open Access

    CORRECTION

    Correction: Stock Market Index Prediction Using Machine Learning and Deep Learning Techniques

    Abdus Saboor1,4, Arif Hussain2, Bless Lord Y. Agbley3, Amin ul Haq3,*, Jian Ping Li3, Rajesh Kumar1,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 107-107, 2023, DOI:10.32604/iasc.2023.047463

    Abstract This article has no abstract. More >

  • Open Access

    REVIEW

    An Overview of ETL Techniques, Tools, Processes and Evaluations in Data Warehousing

    Bilal Khan1, Saifullah Jan1,*, Wahab Khan1, Muhammad Imran Chughtai2

    Journal on Big Data, Vol.6, pp. 1-20, 2024, DOI:10.32604/jbd.2023.046223

    Abstract The extraction, transformation, and loading (ETL) process is a crucial and intricate area of study that lies deep within the broad field of data warehousing. This specific, yet crucial, aspect of data management fills the knowledge gap between unprocessed data and useful insights. Starting with basic information unique to this complex field, this study thoroughly examines the many issues that practitioners encounter. These issues include the complexities of ETL procedures, the rigorous pursuit of data quality, and the increasing amounts and variety of data sources present in the modern data environment. The study examines ETL methods, resources, and the crucial… More >

Displaying 21-30 on page 3 of 667. Per Page