期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Intelligent Software-Defined Network for Cognitive Routing Optimization Using Deep Extreme Learning Machine Approach 被引量:5
1
作者 fahd alhaidari Sultan H.Almotiri +5 位作者 Mohammed A.Al Ghamdi Muhammad Adnan Khan Abdur Rehman Sagheer Abbas Khalid Masood Khan Atta-ur-Rahman 《Computers, Materials & Continua》 SCIE EI 2021年第4期1269-1285,共17页
In recent years,the infrastructure,instruments,and resources of network systems are becoming more complex and heterogeneous,with the rapid development of current internet and mobile communication technologies.In order... In recent years,the infrastructure,instruments,and resources of network systems are becoming more complex and heterogeneous,with the rapid development of current internet and mobile communication technologies.In order to efficaciously prepare,control,hold and optimize networking systems,greater intelligence needs to be deployed.However,due to the inherently dispensed characteristic of conventional networks,Machine Learning(ML)techniques are hard to implement and deployed to govern and operate networks.Software-Defined Networking(SDN)brings us new possibilities to offer intelligence in the networks.SDN’s characteristics(e.g.,logically centralized control,global network view,software-based site visitor analysis,and dynamic updating of forwarding rules)make it simpler to apply machine learning strategies.Various perspectives of fiber-optic communications including fiber nonlinearity coverage,optical performance checking,cognitive shortcoming detection/anticipation,and arranging and improvement of softwaredefined networks are examined in Machine Learning(ML)applications.This research paper has presented an imaginative framework concept called Intelligent Software Defined Network(ISDN)for Cognitive Routing Optimization(CRO)using Deep Extreme Learning Machine(DELM)approach(ISDN-CRO-DELM)in light of the new challenges in the development and operation of communication systems,and capturing motivation from how living creatures deal with difficulty and usability.The proposed methodology develops around the planned applications of progressive DELM methods and,specifically,probabilistic generative models for framework wide learning,demonstrating,improvement,and information description.Furthermore,ISDN-CRO-DELM,suggest to integrate this learning framework with the ISDN for CRO and reconfiguration approaches at the system level.MATLAB 2019a is used for DELM simulation and superior results show the effectiveness of the proposed framework. 展开更多
关键词 SDN DELM machine learning COGNITION
在线阅读 下载PDF
Authenblue: A New Authentication Protocol for the Industrial Internet of Things
2
作者 Rachid Zagrouba Asayel AlAbdullatif +4 位作者 Kholood AlAjaji Norah Al-Serhani fahd alhaidari Abdullah Almuhaideb Atta-ur-Rahman 《Computers, Materials & Continua》 SCIE EI 2021年第4期1103-1119,共17页
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of sensors.Although the IoT evolution led to quality of life enhancement,many of its devices are insecure.The lack of... The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of sensors.Although the IoT evolution led to quality of life enhancement,many of its devices are insecure.The lack of robust key management systems,efficient identity authentication,low fault tolerance,and many other issues lead to IoT devices being easily targeted by attackers.In this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network(CPANs)in an Industrial IoT(IIoT)environment.This study proposed Authenblue protocol as a new Blockchainbased authentication protocol.To enhance the authentication process and make it more secure,Authenblue modified the way of generating IIoT identifiers and the shared secret keys used by the IIoT devices to raise the efficiency of the authentication protocol.Authenblue enhance the authentication protocol that other models rely on by enhancing the approach used to generate the User Identifier(UI).The UI values changed from being static values,sensors MAC addresses,to be generated values in the inception phase.This approach makes the process of renewing the sensor keys more secure by renewing their UI values instead of changing the secret key.In this study,Authenblue has been simulated in the Network Simulator 3(NS3).Simulation results show an improved performance compared to the related work. 展开更多
关键词 AUTHENTICATION industrial internet of things SECURITY Authenblue blockchain NS3
在线阅读 下载PDF
AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets
3
作者 Dhiaa Musleh Atta Rahman +8 位作者 Mohammed Abbas Alkherallah Menhal Kamel Al-Bohassan Mustafa Mohammed Alawami Hayder Ali Alsebaa Jawad Ali Alnemer Ghazi Fayez Al-Mutairi May Issa Aldossary Dalal A.Aldowaihi fahd alhaidari 《Computers, Materials & Continua》 SCIE EI 2024年第7期1033-1054,共22页
With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,l... With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,anxiety,and fear.With the anonymity people get on the internet,they tend to bemore aggressive and express their emotions freely without considering the effects,which can be a reason for the increase in cyberbullying and it is the main motive behind the current study.This study presents a thorough background of cyberbullying and the techniques used to collect,preprocess,and analyze the datasets.Moreover,a comprehensive review of the literature has been conducted to figure out research gaps and effective techniques and practices in cyberbullying detection in various languages,and it was deduced that there is significant room for improvement in the Arabic language.As a result,the current study focuses on the investigation of shortlisted machine learning algorithms in natural language processing(NLP)for the classification of Arabic datasets duly collected from Twitter(also known as X).In this regard,support vector machine(SVM),Naive Bayes(NB),Random Forest(RF),Logistic regression(LR),Bootstrap aggregating(Bagging),Gradient Boosting(GBoost),Light Gradient Boosting Machine(LightGBM),Adaptive Boosting(AdaBoost),and eXtreme Gradient Boosting(XGBoost)were shortlisted and investigated due to their effectiveness in the similar problems.Finally,the scheme was evaluated by well-known performance measures like accuracy,precision,Recall,and F1-score.Consequently,XGBoost exhibited the best performance with 89.95%accuracy,which is promising compared to the state-of-the-art. 展开更多
关键词 Supervised machine learning ensemble learning CYBERBULLYING Arabic tweets NLP
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部