Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,248)
  • Open Access

    ARTICLE

    Insider Threat Detection Based on NLP Word Embedding and Machine Learning

    Mohd Anul Haq1, Mohd Abdul Rahim Khan1,*, Mohammed Alshehri2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 619-635, 2022, DOI:10.32604/iasc.2022.021430

    Abstract The growth of edge computing, the Internet of Things (IoT), and cloud computing have been accompanied by new security issues evolving in the information security infrastructure. Recent studies suggest that the cost of insider attacks is higher than the external threats, making it an essential aspect of information security for organizations. Efficient insider threat detection requires state-of-the-art Artificial Intelligence models and utility. Although significant have been made to detect insider threats for more than a decade, there are many limitations, including a lack of real data, low accuracy, and a relatively low false alarm, which are major concerns needing further… More >

  • Open Access

    ARTICLE

    Light-Weight Present Block Cipher Model for IoT Security on FPGA

    R. Bharathi*, N. Parvatham

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 35-49, 2022, DOI:10.32604/iasc.2022.020681

    Abstract The Internet of Things (IoT) plays an essential role in connecting a small number of billion devices with people for diverse applications. The security and privacy with authentication are challenging work for IoT devices. A light-weight block cipher is designed and modeled with IoT security for real-time scenarios to overcome the above challenges. The light-weight PRESENT module with the integration of encryption (E)-decryption (D) is modeled and implemented on FPGA. The PRESENT module has 64-bit data input with 80/128/256-bit symmetric keys for IoT security. The PRESENT module performs16/32/64 round operations for state register and key updation. The design mainly uses… More >

  • Open Access

    ARTICLE

    Bidirectional Long Short-Term Memory Network for Taxonomic Classification

    Naglaa. F. Soliman1,*, Samia M. Abd Alhalem2, Walid El-Shafai2, Salah Eldin S. E. Abdulrahman3, N. Ismaiel3, El-Sayed M. El-Rabaie2, Abeer D. Algarni1, Fatimah Algarni4, Fathi E. Abd El-Samie1,2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 103-116, 2022, DOI:10.32604/iasc.2022.017691

    Abstract Identifying and classifying Deoxyribonucleic Acid (DNA) sequences and their functions have been considered as the main challenges in bioinformatics. Advances in machine learning and Deep Learning (DL) techniques are expected to improve DNA sequence classification. Since the DNA sequence classification depends on analyzing textual data, Bidirectional Long Short-Term Memory (BLSTM) algorithms are suitable for tackling this task. Generally, classifiers depend on the patterns to be processed and the pre-processing method. This paper is concerned with a new proposed classification framework based on Frequency Chaos Game Representation (FCGR) followed by Discrete Wavelet Transform (DWT) and BLSTM. Firstly, DNA strings are transformed… More >

  • Open Access

    ARTICLE

    Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model

    Xiaona Zhang1,*, Jie Feng2, Zhen Hong3, Xiaona Rui4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 677-688, 2022, DOI:10.32604/csse.2022.023136

    Abstract In regards to soil macropores, the solute loss carried by overland flow is a very complex process. In this study, a fuzzy neural network (FNN) model was used to analyze the solute loss on slopes, taking into account the soil macropores. An artificial rainfall simulation experiment was conducted in indoor experimental tanks, and the verification of the model was based on the results. The characteristic scale of the macropores, the rainfall intensity and duration, the slope and the adsorption coefficient of ions, were chosen as the input variables to the Sugeno FNN model. The cumulative solute loss quantity on the… More >

  • Open Access

    ARTICLE

    Roosters Algorithm: A Novel Nature-Inspired Optimization Algorithm

    Mashar Gencal1,*, Mustafa Oral2

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 727-737, 2022, DOI:10.32604/csse.2022.023018

    Abstract Some species of females, e.g., chicken, bird, fish etc., might mate with more than one males. In the mating of these polygamous creatures, there is competition between males as well as among their offspring. Thus, male reproductive success depends on both male competition and sperm rivalry. Inspired by this type of sexual life of roosters with chickens, a novel nature-inspired optimization algorithm called Roosters Algorithm (RA) is proposed. The algorithm was modelled and implemented based on the sexual behavior of roosters. 13 well-known benchmark optimization functions and 10 IEEE CEC 2018 test functions are utilized to compare the performance of… More >

  • Open Access

    ARTICLE

    CNN Based Automated Weed Detection System Using UAV Imagery

    Mohd Anul Haq*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 837-849, 2022, DOI:10.32604/csse.2022.023016

    Abstract The problem of weeds in crops is a natural problem for farmers. Machine Learning (ML), Deep Learning (DL), and Unmanned Aerial Vehicles (UAV) are among the advanced technologies that should be used in order to reduce the use of pesticides while also protecting the environment and ensuring the safety of crops. Deep Learning-based crop and weed identification systems have the potential to save money while also reducing environmental stress. The accuracy of ML/DL models has been proven to be restricted in the past due to a variety of factors, including the selection of an efficient wavelength, spatial resolution, and the… More >

  • Open Access

    ARTICLE

    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many authentication schemes for remote patient… More >

  • Open Access

    ARTICLE

    PAPR Reduction Using Advanced Partial Transmission Scheme for 5G Waveforms

    Arun Kumar1, Sumit Chakravarty2, S. Suganya3, Mehedi Masud4,*, Sultan Aljahdali4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 483-492, 2022, DOI:10.32604/csse.2022.022899

    Abstract The implementation of Peak Average to Power Ratio (PAPR) reduction technologies will play an important role in the regularization of Fifth Generation (5G) radio communication. PAPR reduction in the advanced waveform will be the key part of designing a 5G network for different applications. This work introduces the simulation of an Advanced Partial Transmission Sequence (A-PTS) reduction techniques for Orthogonal Frequency Division Multiplexing (OFDM) and Filter Bank Multi-Carrier (FBMC) transmission schemes. In the projected A-PTS, the FBMC signals are mapped into the number of sub-blocks and Inverse Fast Fourier transform (IFFT) is performed to estimate the high peak power in… More >

  • Open Access

    ARTICLE

    An Improved Method for Extractive Based Opinion Summarization Using Opinion Mining

    Surbhi Bhatia*, Mohammed AlOjail

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 779-794, 2022, DOI:10.32604/csse.2022.022579

    Abstract Opinion summarization recapitulates the opinions about a common topic automatically. The primary motive of summarization is to preserve the properties of the text and is shortened in a way with no loss in the semantics of the text. The need of automatic summarization efficiently resulted in increased interest among communities of Natural Language Processing and Text Mining. This paper emphasis on building an extractive summarization system combining the features of principal component analysis for dimensionality reduction and bidirectional Recurrent Neural Networks and Long Short-Term Memory (RNN-LSTM) deep learning model for short and exact synopsis using seq2seq model. It presents a… More >

  • Open Access

    ARTICLE

    Predicting Mobile Cross-Platform Adaptation Using a Hybrid Sem–ANN Approach

    Ali Alkhalifah*

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 639-658, 2022, DOI:10.32604/csse.2022.022519

    Abstract Owing to constant changes in user needs, new technologies have been introduced to keep pace by building sustainable applications. Researchers and practitioners are keen to understand the factors that create an attractive user interface. Although the use of cross-platform applications and services is increasing, limited research has examined and evaluated cross-platforms for developing mobile applications for different operating systems. This study evaluates cross-platform features, identifying the main factors that help to create an attractive user adaptation when building sustainable applications for both Android and iOS. Flutter and React Native were selected so end-users could test their features using the cross-platform… More >

Displaying 9501-9510 on page 951 of 22248. Per Page