Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (413)
  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042403

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission, intertwined with resource allocation tactics.… More >

  • Open Access

    ARTICLE

    Adaptive Deep Learning Model to Enhance Smart Greenhouse Agriculture

    Medhat A. Tawfeek1,2, Nacim Yanes3,4, Leila Jamel5,*, Ghadah Aldehim5, Mahmood A. Mahmood1,6

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042179

    Abstract The trend towards smart greenhouses stems from various factors, including a lack of agricultural land area owing to population concentration and housing construction on agricultural land, as well as water shortages. This study proposes building a full farming adaptation model that depends on current sensor readings and available datasets from different agricultural research centers. The proposed model uses a one-dimensional convolutional neural network (CNN) deep learning model to control the growth of strategic crops, including cucumber, pepper, tomato, and bean. The proposed model uses the Internet of Things (IoT) to collect data on agricultural operations and then uses this data… More >

  • Open Access

    ARTICLE

    VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity

    Junqiang Jiang1,2, Zhifang Sun1, Xiong Jiang1, Shengjie Jin1, Yinli Jiang3, Bo Fan1,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.041973

    Abstract The grey wolf optimizer (GWO) is a swarm-based intelligence optimization algorithm by simulating the steps of searching, encircling, and attacking prey in the process of wolf hunting. Along with its advantages of simple principle and few parameters setting, GWO bears drawbacks such as low solution accuracy and slow convergence speed. A few recent advanced GWOs are proposed to try to overcome these disadvantages. However, they are either difficult to apply to large-scale problems due to high time complexity or easily lead to early convergence. To solve the abovementioned issues, a high-accuracy variable grey wolf optimizer (VGWO) with low time complexity… More >

  • Open Access

    ARTICLE

    Detecting Android Botnet Applications Using Convolution Neural Network

    Mamona Arshad1, Ahmad Karim1, Salman Naseer2, Shafiq Ahmad3, Mejdal Alqahtani3, Akber Abid Gardezi4, Muhammad Shafiq5,*, Jin-Ghoo Choi5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2022.028680

    Abstract The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e., games applications, entertainment, online banking, social network sites, etc., and also allow the end users to perform a variety of activities. Because of activities, mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information, phishing, spamming, Distributed Denial of Services (DDoS), and malware dissemination. Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area. A… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Machine Learning Design of Aluminum-Lithium Alloys with High Strength

    Hongxia Wang1,2, Zhiqiang Duan2, Qingwei Guo2, Yongmei Zhang1,2,*, Yuhong Zhao2,3,4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045871

    Abstract Due to the large unexplored compositional space, long development cycle, and high cost of traditional trial-anderror experiments, designing high strength aluminum-lithium alloys is a great challenge. This work establishes a performance-oriented machine learning design strategy for aluminum-lithium alloys to simplify and shorten the development cycle. The calculation results indicate that radial basis function (RBF) neural networks exhibit better predictive ability than back propagation (BP) neural networks. The RBF neural network predicted tensile and yield strengths with determination coefficients of 0.90 and 0.96, root mean square errors of 30.68 and 25.30, and mean absolute errors of 28.15 and 19.08, respectively. In… More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042630

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training parameters associated with the LSTM… More >

  • Open Access

    ARTICLE

    A Deep Learning Based Sentiment Analytic Model for the Prediction of Traffic Accidents

    Nadeem Malik1,*, Saud Altaf1, Muhammad Usman Tariq2, Ashir Ahmed3, Muhammad Babar4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.040455

    Abstract The severity of traffic accidents is a serious global concern, particularly in developing nations. Knowing the main causes and contributing circumstances may reduce the severity of traffic accidents. There exist many machine learning models and decision support systems to predict road accidents by using datasets from different social media forums such as Twitter, blogs and Facebook. Although such approaches get much popularity still there exists an issue of data management and low prediction accuracy. This article presented a deep learning-based sentiment analytic model known as Extra-large Network Bi-directional long short term memory (XLNet-Bi-LSTM) to predict traffic collisions based on data… More >

  • Open Access

    ARTICLE

    An Intelligent Approach for Intrusion Detection in Industrial Control System

    Adel Alkhalil1,*, Abdulaziz Aljaloud1, Diaa Uliyan1, Mohammed Altameemi1, Magdy Abdelrhman2,3, Yaser Altameemi4, Aakash Ahmad5, Romany Fouad Mansour6

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.044506

    Abstract Supervisory control and data acquisition (SCADA) systems are computer systems that gather and analyze real-time data, distributed control systems are specially designed automated control system that consists of geographically distributed control elements, and other smaller control systems such as programmable logic controllers are industrial solid-state computers that monitor inputs and outputs and make logic-based decisions. In recent years, there has been a lot of focus on the security of industrial control systems. Due to the advancement in information technologies, the risk of cyberattacks on industrial control system has been drastically increased. Because they are so inextricably tied to human life,… More >

  • Open Access

    ARTICLE

    Fusion of Region Extraction and Cross-Entropy SVM Models for Wheat Rust Diseases Classification

    Deepak Kumar1, Vinay Kukreja1, Ayush Dogra1,*, Bhawna Goyal2, Talal Taha Ali3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.044287

    Abstract Wheat rust diseases are one of the major types of fungal diseases that cause substantial yield quality losses of 15%–20% every year. The wheat rust diseases are identified either through experienced evaluators or computerassisted techniques. The experienced evaluators take time to identify the disease which is highly laborious and too costly. If wheat rust diseases are predicted at the development stages, then fungicides are sprayed earlier which helps to increase wheat yield quality. To solve the experienced evaluator issues, a combined region extraction and cross-entropy support vector machine (CE-SVM) model is proposed for wheat rust disease identification. In the proposed… More >

Displaying 361-370 on page 37 of 413. Per Page