期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City 被引量:2
1
作者 Muhammad Usman Tariq Muhammad Babar +3 位作者 Mian Ahmad Jan Akmal Saeed Khattak Mohammad Dahman Alshehri Abid Yahya 《Computers, Materials & Continua》 SCIE EI 2021年第4期625-639,共15页
The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that trans... The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that transfer information.The IoT architecture permits on-demand services to a public pool of resources.Cloud computing plays a vital role in developing IoT-enabled smart applications.The integration of cloud computing enhances the offering of distributed resources in the smart city.Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability,security,performance,condentiality,and privacy.The key reason for cloud-and IoT-enabled smart city application failure is improper security practices at the early stages of development.This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications.Its three-layered architecture includes privacy preserved stakeholder analysis(PPSA),security requirement modeling and validation(SRMV),and secure cloud-assistance(SCA).A case study highlights the applicability and effectiveness of the proposed framework.A hybrid survey enables the identication and evaluation of signicant challenges. 展开更多
关键词 SECURITY PRIVACY smart city Internet of Things cloud computing
在线阅读 下载PDF
Adaptation of Vehicular Ad hoc Network Clustering Protocol for Smart Transportation 被引量:2
2
作者 Masood Ahmad Abdul Hameed +5 位作者 Fasee Ullah Ishtiaq Wahid Atif Khan M.Irfan Uddin Shaq Ahmad Ahmed M.El-Sherbeeny 《Computers, Materials & Continua》 SCIE EI 2021年第5期1353-1368,共16页
Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks(VANETs)for smart transportation that results from dynamic topology,limited resources and noncentra... Clustering algorithms optimization can minimize topology maintenance overhead in large scale vehicular Ad hoc networks(VANETs)for smart transportation that results from dynamic topology,limited resources and noncentralized architecture.The performance of a clustering algorithm varies with the underlying mobility model to address the topology maintenance overhead issue in VANETs for smart transportation.To design a robust clustering algorithm,careful attention must be paid to components like mobility models and performance objectives.A clustering algorithm may not perform well with every mobility pattern.Therefore,we propose a supervisory protocol(SP)that observes the mobility pattern of vehicles and identies the realistic Mobility model through microscopic features.An analytical model can be used to determine an efcient clustering algorithm for a specic mobility model(MM).SP selects the best clustering scheme according to the mobility model and guarantees a consistent performance throughout VANET operations.The simulation has performed in three parts that is the central part simulation for setting up the clustering environment,In the second part the clustering algorithms are tested for efciency in a constrained atmosphere for some time and the third part represents the proposed scheme.The simulation results show that the proposed scheme outperforms clustering algorithms such as honey bee algorithm-based clustering and memetic clustering in terms of cluster count,re-afliation rate,control overhead and cluster lifetime. 展开更多
关键词 CLUSTER VANET smart transportation supervisory protocol mobility models
在线阅读 下载PDF
Multi-Label Movie Genre Classification with Attention Mechanism on Movie Plots
3
作者 Faheem Shaukat Naveed Ejaz +3 位作者 Rashid Kamal Tamim Alkhalifah Sheraz Aslam Mu Mu 《Computers, Materials & Continua》 2025年第6期5595-5622,共28页
Automated and accurate movie genre classification is crucial for content organization,recommendation systems,and audience targeting in the film industry.Although most existing approaches focus on audiovisual features ... Automated and accurate movie genre classification is crucial for content organization,recommendation systems,and audience targeting in the film industry.Although most existing approaches focus on audiovisual features such as trailers and posters,the text-based classification remains underexplored despite its accessibility and semantic richness.This paper introduces the Genre Attention Model(GAM),a deep learning architecture that integrates transformer models with a hierarchical attention mechanism to extract and leverage contextual information from movie plots formulti-label genre classification.In order to assess its effectiveness,we assessmultiple transformer-based models,including Bidirectional Encoder Representations fromTransformers(BERT),ALite BERT(ALBERT),Distilled BERT(DistilBERT),Robustly Optimized BERT Pretraining Approach(RoBERTa),Efficiently Learning an Encoder that Classifies Token Replacements Accurately(ELECTRA),eXtreme Learning Network(XLNet)and Decodingenhanced BERT with Disentangled Attention(DeBERTa).Experimental results demonstrate the superior performance of DeBERTa-based GAM,which employs a two-tier hierarchical attention mechanism:word-level attention highlights key terms,while sentence-level attention captures critical narrative segments,ensuring a refined and interpretable representation of movie plots.Evaluated on three benchmark datasets Trailers12K,Large Movie Trailer Dataset-9(LMTD-9),and MovieLens37K.GAM achieves micro-average precision scores of 83.63%,83.32%,and 83.34%,respectively,surpassing state-of-the-artmodels.Additionally,GAMis computationally efficient,requiring just 6.10Giga Floating Point Operations Per Second(GFLOPS),making it a scalable and cost-effective solution.These results highlight the growing potential of text-based deep learning models in genre classification and GAM’s effectiveness in improving predictive accuracy while maintaining computational efficiency.With its robust performance,GAM offers a versatile and scalable framework for content recommendation,film indexing,and media analytics,providing an interpretable alternative to traditional audiovisual-based classification techniques. 展开更多
关键词 Multi-label classification artificial intelligence movie genre classification hierarchical attention mechanisms natural language processing content recommendation text-based genre classification explainable AI(Artificial Intelligence) transformer models BERT
在线阅读 下载PDF
New Modified Controlled Bat Algorithm for Numerical Optimization Problem 被引量:4
4
作者 Waqas Haider Bangyal Abdul Hameed +7 位作者 Jamil Ahmad Kashif Nisar Muhammad Reazul Haque Ag.Asri Ag.Ibrahim Joel J.P.C.Rodrigues M.Adil Khan Danda B.Rawat Richard Etengu 《Computers, Materials & Continua》 SCIE EI 2022年第2期2241-2259,共19页
Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching... Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching behavior.BA faces premature convergence due to its local search capability.Instead of using the standard uniform walk,the Torus walk is viewed as a promising alternative to improve the local search capability.In this work,we proposed an improved variation of BA by applying torus walk to improve diversity and convergence.The proposed.Modern Computerized Bat Algorithm(MCBA)approach has been examined for fifteen well-known benchmark test problems.The finding of our technique shows promising performance as compared to the standard PSO and standard BA.The proposed MCBA,BPA,Standard PSO,and Standard BA have been examined for well-known benchmark test problems and training of the artificial neural network(ANN).We have performed experiments using eight benchmark datasets applied from the worldwide famous machine-learning(ML)repository of UCI.Simulation results have shown that the training of an ANN with MCBA-NN algorithm tops the list considering exactness,with more superiority compared to the traditional methodologies.The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future. 展开更多
关键词 Bat algorithm MCBA ANN ML Torus walk
在线阅读 下载PDF
Combinatorial Method with Static Analysis for Source Code Security in Web Applications
5
作者 Juan Ramon Bermejo Higuera Javier Bermejo Higuera +3 位作者 Juan Antonio Sicilia Montalvo Tomas Sureda Riera Christopher I.Argyros A.Alberto Magrenan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第11期541-565,共25页
Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity.The construction of the procedure utilized in the static analysis tools of source cod... Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity.The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed.To utilize the possible synergies different static analysis tools may process,this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives.Specifically,five static analysis tools will be combined with the designed method to study their behavior using an updated benchmark for OWASP Top Ten Security Weaknesses(OWASP TTSW).The method selects specific metrics to rank the tools for different criticality levels of web applications considering different weights in the ratios.The findings show that simply including more tools in a combination is not synonymous with better results;it depends on the specific tools included in the combination due to their different designs and techniques. 展开更多
关键词 WEAKNESS BENCHMARK security testing analysis comparative methodology tools combination web application
在线阅读 下载PDF
Improved Sequencing Heuristic DSDV Protocol Using Nomadic Mobility Model for FANETS
6
作者 Inam Ullah Khan Muhammad Abul Hassan +2 位作者 Muhammad Fayaz Jeonghwan Gwak Muhammad Adnan Aziz 《Computers, Materials & Continua》 SCIE EI 2022年第2期3653-3666,共14页
Most interesting area is the growing demand of flying-IoT mergers with smart cities.However,aerial vehicles,especially unmanned aerial vehicles(UAVs),have limited capabilities for maintaining node energy efficiency.In... Most interesting area is the growing demand of flying-IoT mergers with smart cities.However,aerial vehicles,especially unmanned aerial vehicles(UAVs),have limited capabilities for maintaining node energy efficiency.In order to communicate effectively,IoT is a key element for smart cities.While improving network performance,routing protocols can be deployed in flying-IoT to improve latency,packet drop rate,packet delivery,power utilization,and average-end-to-end delay.Furthermore,in literature,proposed techniques are verymuch complex which cannot be easily implemented in realworld applications.This issue leads to the development of lightweight energyefficient routing in flying-IoT networks.This paper addresses the energy conservation problem in flying-IoT.This paper presents a novel approach for the internet of flying vehicles using DSDV routing.ISH-DSDV gives the notion of bellman-ford algorithm consisting of routing updates,information broadcasting,and stale method.DSDV shows optimal results in comparison with other contemporary routing protocols.Nomadic mobility model is utilized in the scenario of flying networks to check the performance of routing protocols. 展开更多
关键词 Flying-IoT DSR smart cities UAV’s FANETS
在线阅读 下载PDF
A Fully Bayesian Sparse Probit Model for Text Categorization
7
作者 Behrouz Madahian Usef Faghihi 《Open Journal of Statistics》 2014年第8期611-619,共9页
Nowadays a common problem when processing data sets with the large number of covariates compared to small sample sizes (fat data sets) is to estimate the parameters associated with each covariate. When the number of c... Nowadays a common problem when processing data sets with the large number of covariates compared to small sample sizes (fat data sets) is to estimate the parameters associated with each covariate. When the number of covariates far exceeds the number of samples, the parameter estimation becomes very difficult. Researchers in many fields such as text categorization deal with the burden of finding and estimating important covariates without overfitting the model. In this study, we developed a Sparse Probit Bayesian Model (SPBM) based on Gibbs sampling which utilizes double exponentials prior to induce shrinkage and reduce the number of covariates in the model. The method was evaluated using ten domains such as mathematics, the corpuses of which were downloaded from Wikipedia. From the downloaded corpuses, we created the TFIDF matrix corresponding to all domains and divided the whole data set randomly into training and testing groups of size 300. To make the model more robust we performed 50 re-samplings on selection of training and test groups. The model was implemented in R and the Gibbs sampler ran for 60 k iterations and the first 20 k was discarded as burn in. We performed classification on training and test groups by calculating P (yi = 1) and according to [1] [2] the threshold of 0.5 was used as decision rule. Our model’s performance was compared to Support Vector Machines (SVM) using average sensitivity and specificity across 50 runs. The SPBM achieved high classification accuracy and outperformed SVM in almost all domains analyzed. 展开更多
关键词 BAYESIAN LASSO SHRINKAGE PARAMETER Estimation GENERALIZED Linear Models MACHINE Learning
暂未订购
Cyber-Integrated Predictive Framework for Gynecological Cancer Detection:Leveraging Machine Learning on Numerical Data amidst Cyber-Physical Attack Resilience
8
作者 Muhammad Izhar Khadija Parwez +3 位作者 Saman Iftikhar Adeel Ahmad Shaikhan Bawazeer Saima Abdullah 《Journal on Artificial Intelligence》 2025年第1期55-83,共29页
The growing intersection of gynecological cancer diagnosis and cybersecurity vulnerabilities in healthcare necessitates integrated solutions that address both diagnostic accuracy and data protection.With increasing re... The growing intersection of gynecological cancer diagnosis and cybersecurity vulnerabilities in healthcare necessitates integrated solutions that address both diagnostic accuracy and data protection.With increasing reliance on IoT-enabled medical devices,digital twins,and interconnected healthcare systems,the risk of cyberphysical attacks has escalated significantly.Traditional approaches to machine learning(ML)-based diagnosis often lack real-time threat adaptability and privacy preservation,while cybersecurity frameworks fall short in maintaining clinical relevance.This study introduces HealthSecureNet,a novel Cyber-Integrated Predictive Framework designed to detect gynecological cancer and mitigate cybersecurity threats in real time simultaneously.The proposed model employs a three-tier ML architecture incorporating Gradient Boosting and Support Vector Machines(SVMs)for accurate cancer classification,combined with an adaptive anomaly detection layer leveraging Mahalanobis Distance and severity scoring for threat prioritization.To enhance resilience,the framework integrates Zero Trust principles and Federated Learning(FL),enabling secure,decentralized model training while preserving patient privacy and meeting compliance with HIPAA(Health Insurance Portability and Accountability Act)and GDPR(General Data Protection Regulations).Experimental evaluation using a real-world healthcare cybersecurity dataset demonstrated high accuracy(95.2%),precision(94.3%),recall(91.7%),and AUC-ROC(Area Under the Curve-Receiver Operating Characteristic)(0.94),with a low false positive rate(3.6%).HealthSecureNet outperforms traditional models such as SVM,Random Forest(RF),and k-NN(k-Nearest Neighbor)in both anomaly detection and severity classification accuracy.Its adaptive thresholding and response prioritization mechanisms make it suitable for dynamic healthcare environments,enabling early cancer detection and proactive cyber threatmitigationwithout compromising performance or regulatory standards.This research contributes a robust,dual-purpose solution that enhances both clinical diagnostics and cybersecurity,setting a precedent for future AI(Artificial Intelligence)-driven healthcare systems. 展开更多
关键词 Gynecological cancer detection machine learning(ML) cyber-physical security predictive healthcare model anomaly detection
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部