期刊文献+
共找到105篇文章
< 1 2 6 >
每页显示 20 50 100
A Review of Human Vulnerabilities in Cyber Security: Challenges and Solutions for Microfinance Institutions
1
作者 Evaline Waweru Simon Maina Karume Alex Kibet 《Journal of Information Security》 2025年第1期114-130,共17页
This review examines human vulnerabilities in cybersecurity within Microfinance Institutions, analyzing their impact on organizational resilience. Focusing on social engineering, inadequate security training, and weak... This review examines human vulnerabilities in cybersecurity within Microfinance Institutions, analyzing their impact on organizational resilience. Focusing on social engineering, inadequate security training, and weak internal protocols, the study identifies key vulnerabilities exacerbating cyber threats to MFIs. A literature review using databases like IEEE Xplore and Google Scholar focused on studies from 2019 to 2023 addressing human factors in cybersecurity specific to MFIs. Analysis of 57 studies reveals that phishing and insider threats are predominant, with a 20% annual increase in phishing attempts. Employee susceptibility to these attacks is heightened by insufficient training, with entry-level employees showing the highest vulnerability rates. Further, only 35% of MFIs offer regular cybersecurity training, significantly impacting incident reduction. This paper recommends enhanced training frequency, robust internal controls, and a cybersecurity-aware culture to mitigate human-induced cyber risks in MFIs. 展开更多
关键词 Human Vulnerabilities CYBERSECURITY Microfinance Institutions Cyber Threats Cybersecurity Awareness Risk Mitigation
在线阅读 下载PDF
Deep Learning in Medical Image Analysis: A Comprehensive Review of Algorithms, Trends, Applications, and Challenges
2
作者 Dawa Chyophel Lepcha Bhawna Goyal +4 位作者 Ayush Dogra Ahmed Alkhayyat Prabhat Kumar Sahu Aaliya Ali Vinay Kukreja 《Computer Modeling in Engineering & Sciences》 2025年第11期1487-1573,共87页
Medical image analysis has become a cornerstone of modern healthcare,driven by the exponential growth of data from imaging modalities such as MRI,CT,PET,ultrasound,and X-ray.Traditional machine learning methods have m... Medical image analysis has become a cornerstone of modern healthcare,driven by the exponential growth of data from imaging modalities such as MRI,CT,PET,ultrasound,and X-ray.Traditional machine learning methods have made early contributions;however,recent advancements in deep learning(DL)have revolutionized the field,offering state-of-the-art performance in image classification,segmentation,detection,fusion,registration,and enhancement.This comprehensive review presents an in-depth analysis of deep learning methodologies applied across medical image analysis tasks,highlighting both foundational models and recent innovations.The article begins by introducing conventional techniques and their limitations,setting the stage for DL-based solutions.Core DL architectures,including Convolutional Neural Networks(CNNs),Recurrent Neural Networks(RNNs),Generative Adversarial Networks(GANs),Vision Transformers(ViTs),and hybrid models,are discussed in detail,including their advantages and domain-specific adaptations.Advanced learning paradigms such as semi-supervised learning,selfsupervised learning,and few-shot learning are explored for their potential to mitigate data annotation challenges in clinical datasets.This review further categorizes major tasks in medical image analysis,elaborating on how DL techniques have enabled precise tumor segmentation,lesion detection,modality fusion,super-resolution,and robust classification across diverse clinical settings.Emphasis is placed on applications in oncology,cardiology,neurology,and infectious diseases,including COVID-19.Challenges such as data scarcity,label imbalance,model generalizability,interpretability,and integration into clinical workflows are critically examined.Ethical considerations,explainable AI(XAI),federated learning,and regulatory compliance are discussed as essential components of real-world deployment.Benchmark datasets,evaluation metrics,and comparative performance analyses are presented to support future research.The article concludes with a forward-looking perspective on the role of foundation models,multimodal learning,edge AI,and bio-inspired computing in the future of medical imaging.Overall,this review serves as a valuable resource for researchers,clinicians,and developers aiming to harness deep learning for intelligent,efficient,and clinically viable medical image analysis. 展开更多
关键词 Medical image analysis deep learning(DL) artificial intelligence(AI) neural networks convolutional neural networks(CNNs) generative adversarial networks(GANs) TRANSFORMERS natural language processing(NLP) computational applications comprehensive analysis
在线阅读 下载PDF
Intelligent medicine in focus:the 5 stages of evolution in robot-assisted surgery for prostate cancer in the past 20 years and future implications
3
作者 Jia-Kun Li Tong Tang +19 位作者 Hui Zong Er-Man Wu Jing Zhao Rong-Rong Wu Xiao-Nan Zheng Heng Zhang Yi-Fan Li Xiang-Hong Zhou Chi-Chen Zhang Zi-Long Zhang Yi-Hang Zhang Wei-Zhe Feng Yi Zhou Jiao Wang Qi-Yu Zhu Qi Deng Jia-Ming Zheng Lu Yang Qiang Wei Bai-Rong Shen 《Military Medical Research》 2025年第6期813-821,共9页
Robot-assisted surgery has evolved into a crucial treatment for prostate cancer(PCa).However,from its appearance to today,brain-computer interface,virtual reality,and metaverse have revolutionized the field of robot-a... Robot-assisted surgery has evolved into a crucial treatment for prostate cancer(PCa).However,from its appearance to today,brain-computer interface,virtual reality,and metaverse have revolutionized the field of robot-assisted surgery for PCa,presenting both opportunities and challenges.Especially in the context of contemporary big data and precision medicine,facing the heterogeneity of PCa and the complexity of clinical problems,it still needs to be continuously upgraded and improved.Keeping this in mind,this article summarized the 5 stages of the historical development of robot-assisted surgery for PCa,encompassing the stages of emergence,promotion,development,maturity,and intelligence.Initially,safety concerns were paramount,but subsequent research and engineering advancements have focused on enhancing device efficacy,surgical technology,and achieving precise multi modal treatment.The dominance of da Vinci robot-assisted surgical system has seen this evolution intimately tied to its successive versions.In the future,robot-assisted surgery for PCa will move towards intelligence,promising improved patient outcomes and personalized therapy,alongside formidable challenges.To guide future development,we propose 10 significant prospects spanning clinical,research,engineering,materials,social,and economic domains,envisioning a future era of artificial intelligence in the surgical treatment of PCa. 展开更多
关键词 Robotic surgical system Prostate cancer(PCa) Robot-assisted radical prostatectomy(RARP) Intelligent medicine
原文传递
Balancing sustainability and security:A review of 5G and IoT in smart cities
4
作者 Ghadah Aldehim Sunawar khan +5 位作者 Tariq Shahzad Muhammad Amir Khan Yazeed Yasin Ghadi Weiwei Jiang Tehseen Mazhar Habib Hamam 《Digital Communications and Networks》 2025年第6期1722-1737,共16页
This century's rapid urbanization has disrupted urban governance,sustainability,and resource management.The Internet of Things(IoT)and 5G have the potential to transform smart cities through real-time data process... This century's rapid urbanization has disrupted urban governance,sustainability,and resource management.The Internet of Things(IoT)and 5G have the potential to transform smart cities through real-time data processing,enhanced connectivity,and sustainable urban design.This study investigates the potential of 5G connectivity with the IoT's hierarchical framework to enhance public service provision,mitigate environmental effects,and optimize urban resource management.The article asserts that these technologies can enhance urban operations by tackling scalability,interoperability,and security issues.The research employs case studies from Singapore and Barcelona.The document moreover analyzes AI-driven security systems,6G networks,and the contributions of IoT and 5G to the advancement of a circular economy.The essay asserts that the growth of smart cities necessitates robust policy frameworks to guarantee equitable access,data protection,and ethical considerations.This study integrates prior research with practical experiences to tackle data-informed municipal governance and urban innovation.The importance of policy in fostering inclusive and sustainable urban futures is emphasized. 展开更多
关键词 5G communications Internet of things Smart cities Urban infrastructure Sustainable development CONNECTIVITY Data management
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
5
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
Early Detection of Diabetic Retinopathy Using Machine Intelligence throughDeep Transfer and Representational Learning 被引量:2
6
作者 Fouzia Nawaz Muhammad Ramzan +3 位作者 Khalid Mehmood Hikmat Ullah Khan Saleem Hayat Khan Muhammad Raheel Bhutta 《Computers, Materials & Continua》 SCIE EI 2021年第2期1631-1645,共15页
Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness.DR occurs due to the high blood sugar level of the patient, and it is clumsy tobe detected at an early stage as no early symptoms appea... Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness.DR occurs due to the high blood sugar level of the patient, and it is clumsy tobe detected at an early stage as no early symptoms appear at the initial level. To preventblindness, early detection and regular treatment are needed. Automated detectionbased on machine intelligence may assist the ophthalmologist in examining thepatients’ condition more accurately and efficiently. The purpose of this study is toproduce an automated screening system for recognition and grading of diabetic retinopathyusing machine learning through deep transfer and representational learning.The artificial intelligence technique used is transfer learning on the deep neural network,Inception-v4. Two configuration variants of transfer learning are applied onInception-v4: Fine-tune mode and fixed feature extractor mode. Both configurationmodes have achieved decent accuracy values, but the fine-tuning method outperformsthe fixed feature extractor configuration mode. Fine-tune configuration modehas gained 96.6% accuracy in early detection of DR and 97.7% accuracy in gradingthe disease and has outperformed the state of the art methods in the relevant literature. 展开更多
关键词 Diabetic retinopathy artificial intelligence automated screening system machine learning deep neural network transfer and representational learning
在线阅读 下载PDF
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment 被引量:1
7
作者 Minkyung Lee Julian Jang-Jaccard Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第10期199-223,共25页
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme... New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT. 展开更多
关键词 Blended threat(BT) collaborative units for blended environment(CUBE) internet of blended environment(IoBE) security orchestration automation and response(SOAR)
在线阅读 下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies 被引量:1
8
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
在线阅读 下载PDF
Reliability Modelling and Analysis of Redundant Systems Connected to Supporting External Device for Operation Attended by a Repairman and Repairable Service Station 被引量:1
9
作者 Ibrahim Yusuf Rabia Salihu Said +1 位作者 Fatima Salman Koki Mansur Babagana 《Journal of Applied Mathematics and Physics》 2014年第13期1242-1256,共15页
In this paper, probabilistic models for three redundant configurations have been developed to analyze and compare some reliability characteristics. Each system is connected to a repairable supporting external device f... In this paper, probabilistic models for three redundant configurations have been developed to analyze and compare some reliability characteristics. Each system is connected to a repairable supporting external device for operation. Repairable service station is provided for immediate repair of failed unit. Explicit expressions for mean time to system failure and steady-state availability for the three configurations are developed. Furthermore, we compare the three configurations based on their reliability characteristics and found that configuration II is more reliable and efficient than the remaining configurations. 展开更多
关键词 AVAILABILITY SUPPORTING DEVICE Service STATION REDUNDANCY
暂未订购
ILipo-PseAAC: Identification of Lipoylation Sites Using Statistical Moments and General PseAAC
10
作者 Talha Imtiaz Baig Yaser Daanial Khan +3 位作者 Talha Mahboob Alam Bharat Biswal Hanan Aljuaid Durdana Qaiser Gillani 《Computers, Materials & Continua》 SCIE EI 2022年第4期215-230,共16页
Lysine Lipoylation is a protective and conserved Post Translational Modification(PTM)in proteomics research like prokaryotes and eukaryotes.It is connected with many biological processes and closely linked with many m... Lysine Lipoylation is a protective and conserved Post Translational Modification(PTM)in proteomics research like prokaryotes and eukaryotes.It is connected with many biological processes and closely linked with many metabolic diseases.To develop a perfect and accurate classification model for identifying lipoylation sites at the protein level,the computational methods and several other factors play a key role in this purpose.Usually,most of the techniques and different traditional experimental models have a very high cost.They are time-consuming;so,it is required to construct a predictor model to extract lysine lipoylation sites.This study proposes a model that could predict lysine lipoylation sites with the help of a classification method known as Artificial Neural Network(ANN).The ANN algorithm deals with the noise problem and imbalance classification in lipoylation sites dataset samples.As the result shows in ten-fold cross-validation,a brilliant performance is achieved through the predictor model with an accuracy of 99.88%,and also achieved 0.9976 as the highest value of MCC.So,the predictor model is a very useful and helpful tool for lipoylation sites prediction.Some of the residues around lysine lipoylation sites play a vital part in prediction,as demonstrated during feature analysis.The wonderful results reported through the evaluation and prediction of this model can provide an informative and relative explanation for lipoylation and its molecular mechanisms. 展开更多
关键词 Lipoylation lysine feature vector post translational modification amino acid Mathew’s correlation coefficient neural network
在线阅读 下载PDF
Classifying Misinformation of User Credibility in Social Media Using Supervised Learning
11
作者 Muhammad Asfand-e-Yar Qadeer Hashir +1 位作者 Syed Hassan Tanvir Wajeeha Khalil 《Computers, Materials & Continua》 SCIE EI 2023年第5期2921-2938,共18页
The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social network... The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks. 展开更多
关键词 MISINFORMATION user credibility fake news machine learning
在线阅读 下载PDF
Dataset of Large Gathering Images for Person Identification and Tracking
12
作者 Adnan Nadeem Amir Mehmood +7 位作者 Kashif Rizwan Muhammad Ashraf Nauman Qadeer Ali Alzahrani Qammer H.Abbasi Fazal Noor Majed Alhaisoni Nadeem Mahmood 《Computers, Materials & Continua》 SCIE EI 2023年第3期6065-6080,共16页
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed ... This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi Arabia.This dataset consists of raw and processed images reflecting a highly challenging and unconstraint environment.The methodology for building the dataset consists of four core phases;that include acquisition of videos,extraction of frames,localization of face regions,and cropping and resizing of detected face regions.The raw images in the dataset consist of a total of 4613 frames obtained fromvideo sequences.The processed images in the dataset consist of the face regions of 250 persons extracted from raw data images to ensure the authenticity of the presented data.The dataset further consists of 8 images corresponding to each of the 250 subjects(persons)for a total of 2000 images.It portrays a highly unconstrained and challenging environment with human faces of varying sizes and pixel quality(resolution).Since the face regions in video sequences are severely degraded due to various unavoidable factors,it can be used as a benchmark to test and evaluate face detection and recognition algorithms for research purposes.We have also gathered and displayed records of the presence of subjects who appear in presented frames;in a temporal context.This can also be used as a temporal benchmark for tracking,finding persons,activity monitoring,and crowd counting in large crowd scenarios. 展开更多
关键词 Large crowd gatherings a dataset of large crowd images highly uncontrolled environment tracking missing persons face recognition activity monitoring
在线阅读 下载PDF
Evaluating the Impacts of Security-Durability Characteristic:Data Science Perspective
13
作者 Abdullah Alharbi Masood Ahmad +5 位作者 Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期557-567,共11页
Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps ha... Since the beginning of web applications,security has been a critical study area.There has been a lot of research done to figure out how to define and identify security goals or issues.However,high-security web apps have been found to be less durable in recent years;thus reducing their business continuity.High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability.Hence,there is a necessity to link in the gap between durability and security of the web application.Indeed,security mechanisms must be used to enhance durability as well as the security of the web application.Although durability and security are not related directly,some of their factors influence each other indirectly.Characteristics play an important role in reducing the void between durability and security.In this respect,the present study identifies key characteristics of security and durability that affect each other indirectly and directly,including confidentiality,integrity availability,human trust and trustworthiness.The importance of all the attributes in terms of their weight is essential for their influence on the whole security during the development procedure of web application.To estimate the efficacy of present study,authors employed the Hesitant Fuzzy Analytic Hierarchy Process(H-Fuzzy AHP).The outcomes of our investigations and conclusions will be a useful reference for the web application developers in achieving a more secure and durable web application. 展开更多
关键词 Software security DURABILITY durability of security services web application development process
在线阅读 下载PDF
A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems
14
作者 Ibrar Afzal Noor ul Amin +1 位作者 Zulfiqar Ahmad Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2025年第1期1377-1399,共23页
Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and ... Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and smart transportation systems.Fog computing tackles a range of challenges,including processing,storage,bandwidth,latency,and reliability,by locally distributing secure information through end nodes.Consisting of endpoints,fog nodes,and back-end cloud infrastructure,it provides advanced capabilities beyond traditional cloud computing.In smart environments,particularly within smart city transportation systems,the abundance of devices and nodes poses significant challenges related to power consumption and system reliability.To address the challenges of latency,energy consumption,and fault tolerance in these environments,this paper proposes a latency-aware,faulttolerant framework for resource scheduling and data management,referred to as the FORD framework,for smart cities in fog environments.This framework is designed to meet the demands of time-sensitive applications,such as those in smart transportation systems.The FORD framework incorporates latency-aware resource scheduling to optimize task execution in smart city environments,leveraging resources from both fog and cloud environments.Through simulation-based executions,tasks are allocated to the nearest available nodes with minimum latency.In the event of execution failure,a fault-tolerantmechanism is employed to ensure the successful completion of tasks.Upon successful execution,data is efficiently stored in the cloud data center,ensuring data integrity and reliability within the smart city ecosystem. 展开更多
关键词 Fog computing smart cities smart transportation data management fault tolerance resource scheduling
在线阅读 下载PDF
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
15
作者 Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya 《Computers, Materials & Continua》 2025年第2期3467-3497,共31页
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet Engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics and developing new Objective Functions (OFs). This paper introduces a novel Objective Function (OF), the Reliable and Secure Objective Function (RSOF), designed to enhance the reliability and trustworthiness of parent selection at both the node and link levels within IoT and RPL routing protocols. The RSOF employs an adaptive parent node selection mechanism that incorporates multiple metrics, including Residual Energy (RE), Expected Transmission Count (ETX), Extended RPL Node Trustworthiness (ERNT), and a novel metric that measures node failure rate (NFR). In this mechanism, nodes with a high NFR are excluded from the parent selection process to improve network reliability and stability. The proposed RSOF was evaluated using random and grid topologies in the Cooja Simulator, with tests conducted across small, medium, and large-scale networks to examine the impact of varying node densities. The simulation results indicate a significant improvement in network performance, particularly in terms of average latency, packet acknowledgment ratio (PAR), packet delivery ratio (PDR), and Control Message Overhead (CMO), compared to the standard Minimum Rank with Hysteresis Objective Function (MRHOF). 展开更多
关键词 IOT LLNs RPL objective function OF MRHOF OF0 routing metrics RELIABILITY trustworthiness
在线阅读 下载PDF
An Impact-Aware and Taxonomy-Driven Explainable Machine Learning Framework with Edge Computing for Security in Industrial IoT–Cyber Physical Systems
16
作者 Tamara Zhukabayeva Zulfiqar Ahmad +4 位作者 Nurbolat Tasbolatuly Makpal Zhartybayeva Yerik Mardenov Nurdaulet Karabayev Dilaram Baumuratova 《Computer Modeling in Engineering & Sciences》 2025年第11期2573-2599,共27页
The Industrial Internet of Things(IIoT),combined with the Cyber-Physical Systems(CPS),is transforming industrial automation but also poses great cybersecurity threats because of the complexity and connectivity of the ... The Industrial Internet of Things(IIoT),combined with the Cyber-Physical Systems(CPS),is transforming industrial automation but also poses great cybersecurity threats because of the complexity and connectivity of the systems.There is a lack of explainability,challenges with imbalanced attack classes,and limited consideration of practical edge–cloud deployment strategies in prior works.In the proposed study,we suggest an Impact-Aware Taxonomy-Driven Machine Learning Framework with Edge Deployment and SHapley Additive exPlanations(SHAP)-based Explainable AI(XAI)to attack detection and classification in IIoT-CPS settings.It includes not only unsupervised clustering(K-Means and DBSCAN)to extract latent traffic patterns but also supervised classification based on taxonomy to classify 33 different kinds of attacks into seven high-level categories:Flood Attacks,Botnet/Mirai,Reconnaissance,Spoofing/Man-In-The-Middle(MITM),Injection Attacks,Backdoors/Exploits,and Benign.The three machine learning algorithms,Random Forest,XGBoost,and Multi-Layer Perceptron(MLP),were trained on a realworld dataset of more than 1 million network traffic records,with overall accuracy of 99.4%(RF),99.5%(XGBoost),and 99.1%(MLP).Rare types of attacks,such as injection attacks and backdoors,were examined even in the case of extreme imbalance between the classes.SHAP-based XAI was performed on every model to help gain transparency and trust in the model and identify important features that drive the classification decisions,such as inter-arrival time,TCP flags,and protocol type.A workable edge-computing implementation strategy is proposed,whereby lightweight computing is performed at the edge devices and heavy,computation-intensive analytics is performed at the cloud.This framework is highly accurate,interpretable,and has real-time application,hence a robust and scalable solution to securing IIoT-CPS infrastructure against dynamic cyber-attacks. 展开更多
关键词 Industrial IoT CPS edge computing machine learning XAI attack taxonomy
在线阅读 下载PDF
A Survey on Token Transmission Attacks,Effects,and Mitigation Strategies in IoT Devices
17
作者 Michael Juma Ayuma Shem Mbandu Angolo Philemon Nthenge Kasyoka 《Journal on Artificial Intelligence》 2025年第1期205-254,共50页
The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This surve... The exponential growth of Internet of Things(IoT)devices has introduced significant security challenges,particularly in securing token-based communication protocols used for authentication and authorization.This survey systematically reviews the vulnerabilities in token transmission within IoT environments,focusing on various sophisticated attack vectors such as replay attacks,token hijacking,man-in-the-middle(MITM)attacks,token injection,and eavesdropping among others.These attacks exploit the inherent weaknesses of token-based mechanisms like OAuth,JSON Web Tokens(JWT),and bearer tokens,which are widely used in IoT ecosystems for managing device interactions and access control.The impact of such attacks is profound,leading to unauthorized access,data exfiltration,and control over IoT devices,posing significant threats to privacy,safety,and the operational integrity of critical IoT applications in sectors like healthcare,smart cities,and industrial automation.This paper categorizes these attack vectors,explores real-world case studies,and analyzes their effects on resource-constrained IoT devices that have limited processing power and memory,rendering them more susceptible to such exploits.Furthermore,this survey presents a comprehensive evaluation of existing mitigation techniques,including cryptographic protocols,lightweight secure transmission frameworks,secure token management practices,and network-layer defenses such as Transport Layer Security(TLS)and multi-factor authentication(MFA).The study also highlights the trade-offs between security and performance in IoT systems and identifies key gaps in current research,emphasizing the need for more scalable,energy-efficient,and robust security frameworks to address the evolving landscape of token transmission attacks in IoT devices. 展开更多
关键词 Token transmission IoT attacks IoT authentication CRYPTOGRAPHY ENCRYPTION
在线阅读 下载PDF
Human Motion Prediction Based on Multi-Level Spatial and Temporal Cues Learning
18
作者 Jiayi Geng Yuxuan Wu +5 位作者 Wenbo Lu Pengxiang Su Amel Ksibi Wei Li Zaffar Ahmed Shaikh Di Gai 《Computers, Materials & Continua》 2025年第11期3689-3707,共19页
Predicting human motion based on historical motion sequences is a fundamental problem in computer vision,which is at the core of many applications.Existing approaches primarily focus on encoding spatial dependencies a... Predicting human motion based on historical motion sequences is a fundamental problem in computer vision,which is at the core of many applications.Existing approaches primarily focus on encoding spatial dependencies among human joints while ignoring the temporal cues and the complex relationships across non-consecutive frames.These limitations hinder the model’s ability to generate accurate predictions over longer time horizons and in scenarios with complex motion patterns.To address the above problems,we proposed a novel multi-level spatial and temporal learning model,which consists of a Cross Spatial Dependencies Encoding Module(CSM)and a Dynamic Temporal Connection Encoding Module(DTM).Specifically,the CSM is designed to capture complementary local and global spatial dependent information at both the joint level and the joint pair level.We further present DTM to encode diverse temporal evolution contexts and compress motion features to a deep level,enabling the model to capture both short-term and long-term dependencies efficiently.Extensive experiments conducted on the Human 3.6M and CMU Mocap datasets demonstrate that our model achieves state-of-the-art performance in both short-term and long-term predictions,outperforming existing methods by up to 20.3% in accuracy.Furthermore,ablation studies confirm the significant contributions of the CSM and DTM in enhancing prediction accuracy. 展开更多
关键词 Human motion prediction spatial dependencies learning temporal context learning graph convolutional networks transformer
在线阅读 下载PDF
Intelligent non-invasive elderly fall monitoring by designing software defined radio frequency sensing system
19
作者 Adeel Akram Muhammad Bilal Khan +4 位作者 Najah Abed Abu Ali Qixing Zhang Awais Ahmad Muhammad Shahid Iqbal Syed Atif Moqurrab 《Digital Communications and Networks》 2025年第3期634-641,共8页
The global increase in life expectancy poses challenges related to the safety and well-being of the elderly population,especially in relation to falls.While falls can lead to significant cognitive impairments,timely i... The global increase in life expectancy poses challenges related to the safety and well-being of the elderly population,especially in relation to falls.While falls can lead to significant cognitive impairments,timely intervention can mitigate their adverse effects.In this context,the need for non-invasive,efficient monitoring systems becomes paramount.Although wearable sensors have gained traction for monitoring health activities,they may cause discomfort during prolonged use,especially for the elderly.To address this issue,we present an intelligent,non-invasive Software-Defined Radio Frequency(SDRF)sensing system,tailored red for monitoring elderly people’s falls during routine activities.Harnessing the power of deep learning and machine learning,our system processes the Wireless Channel State Information(WCSI)generated during regular and fall activities.By employing sophisticated signal processing techniques,the system captures unique patterns that distinguish falls from normal activities.In addition,we use statistical features to streamline data processing,thereby optimizing the computational efficiency of the system.Our experiments,conducted for a typical home environment while using treadmill,demonstrate the robustness of the system.The results show high classification accuracies of 92.5%,95.1%,and 99.8%for three Artificial Intelligence(AI)algorithms.Notably,the SDRF-based approach offers flexibility,cost-effectiveness,and adaptability through software modifications,circumventing the need for hardware overhaul.This research attempts to bridge the gap in RF-based sensing for elderly fall monitoring,providing a solution that combines the benefits of non-invasiveness with the precision of deep learning and machine learning. 展开更多
关键词 AI Elderly falls Intelligent learning SDRF WCSI
暂未订购
Effective and Efficient Feature Selection for Large-scale Data Using Bayes' Theorem 被引量:7
20
作者 Subramanian Appavu Alias Balamurugan Ramasamy Rajaram 《International Journal of Automation and computing》 EI 2009年第1期62-71,共10页
This paper proposes one method of feature selection by using Bayes' theorem. The purpose of the proposed method is to reduce the computational complexity and increase the classification accuracy of the selected featu... This paper proposes one method of feature selection by using Bayes' theorem. The purpose of the proposed method is to reduce the computational complexity and increase the classification accuracy of the selected feature subsets. The dependence between two attributes (binary) is determined based on the probabilities of their joint values that contribute to positive and negative classification decisions. If opposing sets of attribute values do not lead to opposing classification decisions (zero probability), then the two attributes are considered independent of each other, otherwise dependent, and one of them can be removed and thus the number of attributes is reduced. The process must be repeated on all combinations of attributes. The paper also evaluates the approach by comparing it with existing feature selection algorithms over 8 datasets from University of California, Irvine (UCI) machine learning databases. The proposed method shows better results in terms of number of selected features, classification accuracy, and running time than most existing algorithms. 展开更多
关键词 Data mining CLASSIFICATION feature selection dimensionality reduction Bayes' theorem.
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部