Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain

    Jieren Cheng1,3, Xiulai Li1,2,3,4,*, Xinbing Xu2,3, Xiangyan Tang1,3, Victor S. Sheng5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 975-992, 2023, DOI:10.32604/csse.2023.039280 - 26 May 2023

    Abstract With the rapid development of blockchain technology, the number of distributed applications continues to increase, so ensuring the security of the network has become particularly important. However, due to its decentralized, decentralized nature, blockchain networks are vulnerable to distributed denial-of-service (DDoS) attacks, which can lead to service stops, causing serious economic losses and social impacts. The research questions in this paper mainly include two aspects: first, the classification of DDoS, which refers to detecting whether blockchain nodes are suffering DDoS attacks, that is, detecting the data of nodes in parallel; The second is the problem… More >

  • Open Access

    ARTICLE

    Intelligent Networked Control of Vasoactive Drug Infusion for Patients with Uncertain Sensitivity

    Mohamed Esmail Karar1,2,*, Amged Sayed A. Mahmoud2,3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.039235 - 26 May 2023

    Abstract Abnormal high blood pressure or hypertension is still the leading risk factor for death and disability worldwide. This paper presents a new intelligent networked control of medical drug infusion system to regulate the mean arterial blood pressure for hypertensive patients with different health status conditions. The infusion of vasoactive drugs to patients endures various issues, such as variation of sensitivity and noise, which require effective and powerful systems to ensure robustness and good performance. The developed intelligent networked system is composed of a hybrid control scheme of interval type-2 fuzzy (IT2F) logic and teaching-learning-based optimization… More >

  • Open Access

    ARTICLE

    Network Security Situation Prediction Based on TCAN-BiGRU Optimized by SSA and IQPSO

    Junfeng Sun1, Chenghai Li1, Yafei Song1,*, Peng Ni2, Jian Wang1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 993-1021, 2023, DOI:10.32604/csse.2023.039215 - 26 May 2023

    Abstract The accuracy of historical situation values is required for traditional network security situation prediction (NSSP). There are discrepancies in the correlation and weighting of the various network security elements. To solve these problems, a combined prediction model based on the temporal convolution attention network (TCAN) and bi-directional gate recurrent unit (BiGRU) network is proposed, which is optimized by singular spectrum analysis (SSA) and improved quantum particle swarm optimization algorithm (IQPSO). This model first decomposes and reconstructs network security situation data into a series of subsequences by SSA to remove the noise from the data. Furthermore,… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207 - 26 May 2023

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is… More >

  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111 - 26 May 2023

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used.… More >

  • Open Access

    ARTICLE

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms

    Shehab Abdulhabib Alzaeemi1, Kim Gaik Tay1,*, Audrey Huong1, Saratha Sathasivam2, Majid Khan bin Majahar Ali2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1163-1184, 2023, DOI:10.32604/csse.2023.038912 - 26 May 2023

    Abstract Radial Basis Function Neural Network (RBFNN) ensembles have long suffered from non-efficient training, where incorrect parameter settings can be computationally disastrous. This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network (SRBFNN) through the behavior’s integration of satisfiability programming. Inspired by evolutionary algorithms, which can iteratively find the near-optimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN-2SAT). The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different… More >

  • Open Access

    ARTICLE

    Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis

    Mamoona Humayun1,*, Danish Javed2, Nz Jhanjhi2, Maram Fahaad Almufareh1, Saleh Naif Almuayqil1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 575-591, 2023, DOI:10.32604/csse.2023.038765 - 26 May 2023

    Abstract Twitter has emerged as a platform that produces new data every day through its users which can be utilized for various purposes. People express their unique ideas and views on multiple topics thus providing vast knowledge. Sentiment analysis is critical from the corporate and political perspectives as it can impact decision-making. Since the proliferation of COVID-19, it has become an important challenge to detect the sentiment of COVID-19-related tweets so that people’s opinions can be tracked. The purpose of this research is to detect the sentiment of people regarding this problem with limited data as… More >

  • Open Access

    ARTICLE

    Comparative Analysis for Evaluating Wind Energy Resources Using Intelligent Optimization Algorithms and Numerical Methods

    Musaed Alrashidi*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 491-513, 2023, DOI:10.32604/csse.2023.038628 - 26 May 2023

    Abstract Statistical distributions are used to model wind speed, and the two-parameters Weibull distribution has proven its effectiveness at characterizing wind speed. Accurate estimation of Weibull parameters, the scale (c) and shape (k), is crucial in describing the actual wind speed data and evaluating the wind energy potential. Therefore, this study compares the most common conventional numerical (CN) estimation methods and the recent intelligent optimization algorithms (IOA) to show how precise estimation of c and k affects the wind energy resource assessments. In addition, this study conducts technical and economic feasibility studies for five sites in the northern… More >

  • Open Access

    ARTICLE

    Improved Blending Attention Mechanism in Visual Question Answering

    Siyu Lu1, Yueming Ding1, Zhengtong Yin2, Mingzhe Liu3,*, Xuan Liu4, Wenfeng Zheng1,*, Lirong Yin5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1149-1161, 2023, DOI:10.32604/csse.2023.038598 - 26 May 2023

    Abstract Visual question answering (VQA) has attracted more and more attention in computer vision and natural language processing. Scholars are committed to studying how to better integrate image features and text features to achieve better results in VQA tasks. Analysis of all features may cause information redundancy and heavy computational burden. Attention mechanism is a wise way to solve this problem. However, using single attention mechanism may cause incomplete concern of features. This paper improves the attention mechanism method and proposes a hybrid attention mechanism that combines the spatial attention mechanism method and the channel attention More >

  • Open Access

    ARTICLE

    Fine-Grained Pornographic Image Recognition with Multi-Instance Learning

    Zhiqiang Wu*, Bing Xie

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 299-316, 2023, DOI:10.32604/csse.2023.038586 - 26 May 2023

    Abstract Image has become an essential medium for expressing meaning and disseminating information. Many images are uploaded to the Internet, among which some are pornographic, causing adverse effects on public psychological health. To create a clean and positive Internet environment, network enforcement agencies need an automatic and efficient pornographic image recognition tool. Previous studies on pornographic images mainly rely on convolutional neural networks (CNN). Because of CNN’s many parameters, they must rely on a large labeled training dataset, which takes work to build. To reduce the effect of the database on the recognition performance of pornographic… More >

Displaying 9251-9260 on page 926 of 31561. Per Page