期刊文献+
共找到54篇文章
< 1 2 3 >
每页显示 20 50 100
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
1
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
Modeling of CO_(2)Emission for Light-Duty Vehicles:Insights from Machine Learning in a Logistics and Transportation Framework
2
作者 Sahbi Boubaker Sameer Al-Dahidi Faisal S.Alsubaei 《Computer Modeling in Engineering & Sciences》 2025年第6期3583-3614,共32页
The transportation and logistics sectors are major contributors to Greenhouse Gase(GHG)emissions.Carbon dioxide(CO_(2))from Light-Duty Vehicles(LDVs)is posing serious risks to air quality and public health.Understandi... The transportation and logistics sectors are major contributors to Greenhouse Gase(GHG)emissions.Carbon dioxide(CO_(2))from Light-Duty Vehicles(LDVs)is posing serious risks to air quality and public health.Understanding the extent of LDVs’impact on climate change and human well-being is crucial for informed decisionmaking and effective mitigation strategies.This study investigates the predictability of CO_(2)emissions from LDVs using a comprehensive dataset that includes vehicles from various manufacturers,their CO_(2)emission levels,and key influencing factors.Specifically,sixMachine Learning(ML)algorithms,ranging fromsimple linearmodels to complex non-linear models,were applied under identical conditions to ensure a fair comparison and their performance metrics were calculated.The obtained results showed a significant influence of variables such as engine size on CO_(2)emissions.Although the six algorithms have provided accurate forecasts,the Linear Regression(LR)model was found to be sufficient,achieving a Mean Absolute Percentage Error(MAPE)below 0.90%and a Coefficient of Determination(R2)exceeding 99.7%.These findings may contribute to a deeper understanding of LDVs’role in CO_(2)emissions and offer actionable insights for reducing their environmental impact.In fact,vehicle manufacturers can leverage these insights to target key emission-related factors,while policymakers and stakeholders in logistics and transportation can use the models to estimate the CO_(2)emissions of new vehicles before their market deployment or to project future emissions from current and expected LDV fleets. 展开更多
关键词 CO_(2)emission machine learning modeling prediction performance metrics light-duty vehicles climate change transportation and logistics
在线阅读 下载PDF
Detection and Classification of Fig Plant Leaf Diseases Using Convolution Neural Network
3
作者 Rahim Khan Ihsan Rabbi +2 位作者 Umar Farooq Jawad Khan Fahad Alturise 《Computers, Materials & Continua》 2025年第7期827-842,共16页
Leaf disease identification is one of the most promising applications of convolutional neural networks(CNNs).This method represents a significant step towards revolutionizing agriculture by enabling the quick and accu... Leaf disease identification is one of the most promising applications of convolutional neural networks(CNNs).This method represents a significant step towards revolutionizing agriculture by enabling the quick and accurate assessment of plant health.In this study,a CNN model was specifically designed and tested to detect and categorize diseases on fig tree leaves.The researchers utilized a dataset of 3422 images,divided into four classes:healthy,fig rust,fig mosaic,and anthracnose.These diseases can significantly reduce the yield and quality of fig tree fruit.The objective of this research is to develop a CNN that can identify and categorize diseases in fig tree leaves.The data for this study was collected from gardens in the Amandi and Mamash Khail Bannu districts of the Khyber Pakhtunkhwa region in Pakistan.To minimize the risk of overfitting and enhance the model’s performance,early stopping techniques and data augmentation were employed.As a result,the model achieved a training accuracy of 91.53%and a validation accuracy of 90.12%,which are considered respectable.This comprehensive model assists farmers in the early identification and categorization of fig tree leaf diseases.Our experts believe that CNNs could serve as valuable tools for accurate disease classification and detection in precision agriculture.We recommend further research to explore additional data sources and more advanced neural networks to improve the model’s accuracy and applicability.Future research will focus on expanding the dataset by including new diseases and testing the model in real-world scenarios to enhance sustainable farming practices. 展开更多
关键词 Fig tree leaf diseases deep learning convolutional neural network disease detection and classification agriculture technology
在线阅读 下载PDF
HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things
4
作者 Amjad Khan Rahim Khan +1 位作者 Fahad Alturise Tamim Alkhalifah 《Computers, Materials & Continua》 2025年第2期3161-3178,共18页
The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These in... The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the critical issues, which is the prediction of fraudulent devices, i.e., adversaries, preferably as early as possible in the IoT. In this paper, a hybrid communication mechanism is presented where the Hidden Markov Model (HMM) predicts the legitimacy of the requesting device (both source and destination), and the Advanced Encryption Standard (AES) safeguards the reliability of the transmitted data over a shared communication medium, preferably through a secret shared key, i.e., , and timestamp information. A device becomes trusted if it has passed both evaluation levels, i.e., HMM and message decryption, within a stipulated time interval. The proposed hybrid, along with existing state-of-the-art approaches, has been simulated in the realistic environment of the IoT to verify the security measures. These evaluations were carried out in the presence of intruders capable of launching various attacks simultaneously, such as man-in-the-middle, device impersonations, and masquerading attacks. Moreover, the proposed approach has been proven to be more effective than existing state-of-the-art approaches due to its exceptional performance in communication, processing, and storage overheads, i.e., 13%, 19%, and 16%, respectively. Finally, the proposed hybrid approach is pruned against well-known security attacks in the IoT. 展开更多
关键词 Internet of Things information security AUTHENTICATION hidden Markov model MULTIMEDIA
在线阅读 下载PDF
Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things
5
作者 Amal Al-Rasheed Rahim Khan +1 位作者 Fahad Alturise Salem Alkhalaf 《Computers, Materials & Continua》 2025年第7期957-973,共17页
The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these netwo... The Internet of Things(IoT)is a smart infrastructure where devices share captured data with the respective server or edge modules.However,secure and reliable communication is among the challenging tasks in these networks,as shared channels are used to transmit packets.In this paper,a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT.Initially,every device works collaboratively to form a distributed network.In this model,if a device is deployed outside the coverage area of the nearest server,it communicates indirectly through the neighboring devices.For this purpose,every device collects data from the respective neighboring devices,such as hop count,average packet transmission delay,criticality factor,link reliability,and RSSI value,etc.These parameters are used to find an optimal route from the source to the destination.Secondly,the proposed approach has enabled devices to learn from the environment and adjust the optimal route-finding formula accordingly.Moreover,these devices and server modules must ensure that every packet is transmitted securely,which is possible only if it is encrypted with an encryption algorithm.For this purpose,a decision tree-enabled device-to-server authentication algorithm is presented where every device and server must take part in the offline phase.Simulation results have verified that the proposed distributed communication approach has the potential to ensure the integrity and confidentiality of data during transmission.Moreover,the proposed approach has outperformed the existing approaches in terms of communication cost,processing overhead,end-to-end delay,packet loss ratio,and throughput.Finally,the proposed approach is adoptable in different networking infrastructures. 展开更多
关键词 Internet of things distributed communication SECURITY AUTHENTICATION decision tree
在线阅读 下载PDF
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies 被引量:1
6
作者 Waseem Akram Khalid Mahmood +3 位作者 Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon 《Computers, Materials & Continua》 SCIE EI 2024年第7期263-280,共18页
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookie... Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the Internet.HTTP cookies are exploited to carry client patterns observed by a website.These client patterns facilitate the particular client’s future visit to the corresponding website.However,security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser.Several protocols have been introduced that maintain HTTP cookies,but many of those fail to achieve the required security,or require a lot of resource overheads.In this article,we have introduced a lightweight Elliptic Curve Cryptographic(ECC)based protocol for authenticating client and server transactions to maintain the privacy and security of HTTP cookies.Our proposed protocol uses a secret key embedded within a cookie.The proposed protocol ismore efficient and lightweight than related protocols because of its reduced computation,storage,and communication costs.Moreover,the analysis presented in this paper confirms that proposed protocol resists various known attacks. 展开更多
关键词 COOKIES authentication protocol impersonation attack ECC
在线阅读 下载PDF
Evaluation of Modern Generative Networks for EchoCG Image Generation
7
作者 Sabina Rakhmetulayeva Zhandos Zhanabekov Aigerim Bolshibayeva 《Computers, Materials & Continua》 SCIE EI 2024年第12期4503-4523,共21页
The applications of machine learning(ML)in the medical domain are often hindered by the limited availability of high-quality data.To address this challenge,we explore the synthetic generation of echocardiography image... The applications of machine learning(ML)in the medical domain are often hindered by the limited availability of high-quality data.To address this challenge,we explore the synthetic generation of echocardiography images(echoCG)using state-of-the-art generative models.We conduct a comprehensive evaluation of three prominent methods:Cycle-consistent generative adversarial network(CycleGAN),Contrastive Unpaired Translation(CUT),and Stable Diffusion 1.5 with Low-Rank Adaptation(LoRA).Our research presents the data generation methodol-ogy,image samples,and evaluation strategy,followed by an extensive user study involving licensed cardiologists and surgeons who assess the perceived quality and medical soundness of the generated images.Our findings indicate that Stable Diffusion outperforms both CycleGAN and CUT in generating images that are nearly indistinguishable from real echoCG images,making it a promising tool for augmenting medical datasets.However,we also identify limitations in the synthetic images generated by CycleGAN and CUT,which are easily distinguishable as non-realistic by medical professionals.This study highlights the potential of diffusion models in medical imaging and their applicability in addressing data scarcity,while also outlining the areas for future improvement. 展开更多
关键词 Synthetic image generation synthetic echogcardiography generative adversarial networks CycleGAN latent diffusion models stable diffusion
在线阅读 下载PDF
Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection
8
作者 Mohammad Al-Omari Qasem Abu Al-Haija 《Computer Systems Science & Engineering》 2024年第6期1537-1555,共19页
More businesses are deploying powerful Intrusion Detection Systems(IDS)to secure their data and physical assets.Improved cyber-attack detection and prevention in these systems requires machine learning(ML)approaches.T... More businesses are deploying powerful Intrusion Detection Systems(IDS)to secure their data and physical assets.Improved cyber-attack detection and prevention in these systems requires machine learning(ML)approaches.This paper examines a cyber-attack prediction system combining feature selection(FS)and ML.Our technique’s foundation was based on Correlation Analysis(CA),Mutual Information(MI),and recursive feature reduction with cross-validation.To optimize the IDS performance,the security features must be carefully selected from multiple-dimensional datasets,and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets.Our technique identified 22 key characteristics in UNSW-NB-15 and 8 in TON_IoT.We evaluated prediction using seven ML methods:Decision Tree(DT),Random Forest(RF),Logistic Regression(LR),Naive Bayes(NB),K-Nearest Neighbors(KNN),Support Vector Machines(SVM),and Multilayer Perceptron(MLP)classifiers.The DT,RF,NB,and MLP classifiers helped our model surpass the competition on both datasets.Therefore,the investigational outcomes of our hybrid model may help IDSs defend business assets from various cyberattack vectors. 展开更多
关键词 Machine learning CYBERSECURITY cyberattacks feature selection classification intrusion detection system
在线阅读 下载PDF
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
9
作者 Ahmad Ababneh Yousef Sanjalawe +2 位作者 Salam Fraihat Salam Al-E’mari Hamzah Alqudah 《Computers, Materials & Continua》 SCIE EI 2024年第7期1347-1379,共33页
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies. 展开更多
关键词 Information retrieval orbit weighting scheme semantic text analysis Tf-Idf weighting scheme vector space model
在线阅读 下载PDF
Enhancing Cybersecurity through Cloud Computing Solutions in the United States
10
作者 Omolola F. Hassan Folorunsho O. Fatai +4 位作者 Oluwadare Aderibigbe Abdullah Oladoyin Akinde Tolulope Onasanya Mariam Adetoun Sanusi Oduwunmi Odukoya 《Intelligent Information Management》 2024年第4期176-193,共18页
This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of inte... This study investigates how cybersecurity can be enhanced through cloud computing solutions in the United States. The motive for this study is due to the rampant loss of data, breaches, and unauthorized access of internet criminals in the United States. The study adopted a survey research design, collecting data from 890 cloud professionals with relevant knowledge of cybersecurity and cloud computing. A machine learning approach was adopted, specifically a random forest classifier, an ensemble, and a decision tree model. Out of the features in the data, ten important features were selected using random forest feature importance, which helps to achieve the objective of the study. The study’s purpose is to enable organizations to develop suitable techniques to prevent cybercrime using random forest predictions as they relate to cloud services in the United States. The effectiveness of the models used is evaluated by utilizing validation matrices that include recall values, accuracy, and precision, in addition to F1 scores and confusion matrices. Based on evaluation scores (accuracy, precision, recall, and F1 scores) of 81.9%, 82.6%, and 82.1%, the results demonstrated the effectiveness of the random forest model. It showed the importance of machine learning algorithms in preventing cybercrime and boosting security in the cloud environment. It recommends that other machine learning models be adopted to see how to improve cybersecurity through cloud computing. 展开更多
关键词 CYBERSECURITY Cloud Computing Cloud Solutions Machine Learning Algorithm
在线阅读 下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
11
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
在线阅读 下载PDF
The Role of AI in Cyber Security: Safeguarding Digital Identity
12
作者 Mohammad Binhammad Shaikha Alqaydi +1 位作者 Azzam Othman Laila Hatim Abuljadayel 《Journal of Information Security》 2024年第2期245-278,共34页
This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen o... This article signals the use of Artificial Intelligence (AI) in information security where its merits, downsides as well as unanticipated negative outcomes are noted. It considers AI based models that can strengthen or undermine infrastructural functions and organize the networks. In addition, the essay delves into AI’s role in Cyber security software development and the need for AI-resilient strategies that could anticipate and thwart AI-created vulnerabilities. The document also touched on the socioeconomic ramifications of the emergence of AI in Cyber security as well. Looking into AI and security literature, the report outlines benefits including made threat detection precision, extended security ops efficiency, and preventive security tasks. At the same time, it emphasizes the positive side of AI, but it also shows potential limitations such as data bias, lack of interpretability, ethical concerns, and security flaws. The work similarly focuses on the characterized of misuse and sophisticated cyberattacks. The research suggests ways to diminish AI-generating maleficence which comprise ethical AI development, robust safety measures and constant audits and updates. With regard to the AI application in Cyber security, there are both pros and cons in terms of socio-economic issues, for example, job displacement, economic growth and the change in the required workforce skills. 展开更多
关键词 Artificial Intelligence Cyber Attack Cyber Security Real-Time Mitigation Social Media Security AI-Driven Threat Intelligence
在线阅读 下载PDF
AssessITS: Integrating Procedural Guidelines and Practical Evaluation Metrics for Organizational IT and Cybersecurity Risk Assessment
13
作者 Mir Mehedi Rahman Naresh Kshetri +1 位作者 Sayed Abu Sayeed Md Masud Rana 《Journal of Information Security》 2024年第4期564-588,共25页
In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an act... In today’s digitally driven landscape, robust Information Technology (IT) risk assessment practices are essential for safeguarding systems, digital communication, and data. This paper introduces “AssessITS,” an actionable method designed to provide organizations with comprehensive guidelines for conducting IT and cybersecurity risk assessments. Drawing extensively from NIST 800-30 Rev 1, COBIT 5, and ISO 31000, “AssessITS” bridges the gap between high-level theoretical standards and practical implementation challenges. The paper outlines a step-by-step methodology that organizations can simply adopt to systematically identify, analyze, and mitigate IT risks. By simplifying complex principles into actionable procedures, this framework equips practitioners with the tools needed to perform risk assessments independently, without too much reliance on external vendors. The guidelines are developed to be straightforward, integrating practical evaluation metrics that allow for the precise quantification of asset values, threat levels, vulnerabilities, and impacts on confidentiality, integrity, and availability. This approach ensures that the risk assessment process is not only comprehensive but also accessible, enabling decision-makers to implement effective risk mitigation strategies customized to their unique operational contexts. “AssessITS” aims to enable organizations to enhance their IT security strength through practical, actionable guidance based on internationally recognized standards. 展开更多
关键词 CYBERSECURITY Information Security Risk Assessment Risk Evaluation Risk Mitigation Threat Level Vulnerability Assessment
在线阅读 下载PDF
Optimization of the Physical Aperture of the Parabolic Reflector Antenna
14
作者 Nkordeh Nsikan Akindele Ayoola +2 位作者 Ololade Oladoyin Amadi Eberi Ibinabo Bobmanuel 《Open Journal of Applied Sciences》 2024年第1期182-192,共11页
In fields like astronomy and radar technology, high-gain antennas are required for long-distance communication. Due to its relatively large gain, the use of parabolic antennas has become very popular over time, becaus... In fields like astronomy and radar technology, high-gain antennas are required for long-distance communication. Due to its relatively large gain, the use of parabolic antennas has become very popular over time, because they can easily achieve gains of above 30 dB at microwave and higher frequencies. Today, most systems’ success depends on how well the antennas perform. These antennas are available in different types and sizes. Each antenna’s effective area usually has less than the actual physical area of the antenna surface. This means that the unused area of the antenna is massive, and a waste. The aim of the research is to show that the actual physical aperture of a parabolic antenna can be reduced as much as possible to equal the effective area, as given by the antenna formula, thereby saving manufacturing costs, improve the aesthetics. In other words, the focus of this work is to experimentally show that reflector antenna can be made of smaller sizes but better performance. Measurements were taken from different positions from a parabolic antenna, the signal level measured and compared with signal levels for optimal performance. 展开更多
关键词 PARABOLIC ANTENNA RECEPTION MANUFACTURING COST
在线阅读 下载PDF
Deep Learning in Biomedical Image and Signal Processing:A Survey
15
作者 Batyrkhan Omarov 《Computers, Materials & Continua》 2025年第11期2195-2253,共59页
Deep learning now underpins many state-of-the-art systems for biomedical image and signal processing,enabling automated lesion detection,physiological monitoring,and therapy planning with accuracy that rivals expert p... Deep learning now underpins many state-of-the-art systems for biomedical image and signal processing,enabling automated lesion detection,physiological monitoring,and therapy planning with accuracy that rivals expert performance.This survey reviews the principal model families as convolutional,recurrent,generative,reinforcement,autoencoder,and transfer-learning approaches as emphasising how their architectural choices map to tasks such as segmentation,classification,reconstruction,and anomaly detection.A dedicated treatment of multimodal fusion networks shows how imaging features can be integrated with genomic profiles and clinical records to yield more robust,context-aware predictions.To support clinical adoption,we outline post-hoc explainability techniques(Grad-CAM,SHAP,LIME)and describe emerging intrinsically interpretable designs that expose decision logic to end users.Regulatory guidance from the U.S.FDA,the European Medicines Agency,and the EU AI Act is summarised,linking transparency and lifecycle-monitoring requirements to concrete development practices.Remaining challenges as data imbalance,computational cost,privacy constraints,and cross-domain generalization are discussed alongside promising solutions such as federated learning,uncertainty quantification,and lightweight 3-D architectures.The article therefore offers researchers,clinicians,and policymakers a concise,practice-oriented roadmap for deploying trustworthy deep-learning systems in healthcare. 展开更多
关键词 Deep learning biomedical imaging signal processing neural networks image segmentation disease classification drug discovery patient monitoring robotic surgery artificial intelligence in healthcare
在线阅读 下载PDF
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
16
作者 Xin Tong Jingya Wang +3 位作者 Ying Yang Tian Peng Hanming Zhai Guangming Ling 《Computers, Materials & Continua》 2025年第2期1901-1924,共24页
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal ... With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal issue.While deep learning-based text classifiers offer promise,they often exhibit suboptimal performance in fine-grained detection tasks,primarily due to imbalanced datasets and insufficient model representation capabilities.To address this challenge,this paper proposes an LLMs-enhanced graph fusion dual-stream Transformer model for fine-grained Chinese malicious SMS detection.During the data processing stage,Large Language Models(LLMs)are employed for data augmentation,mitigating dataset imbalance.In the data input stage,both word-level and character-level features are utilized as model inputs,enhancing the richness of features and preventing information loss.A dual-stream Transformer serves as the backbone network in the learning representation stage,complemented by a graph-based feature fusion mechanism.At the output stage,both supervised classification cross-entropy loss and supervised contrastive learning loss are used as multi-task optimization objectives,further enhancing the model’s feature representation.Experimental results demonstrate that the proposed method significantly outperforms baselines on a publicly available Chinese malicious SMS dataset. 展开更多
关键词 Transformers malicious SMS multi-task learning large language models
在线阅读 下载PDF
Barber Optimization Algorithm:A New Human-Based Approach for Solving Optimization Problems
17
作者 Tareq Hamadneh Belal Batiha +8 位作者 Omar Alsayyed Widi Aribowo Zeinab Montazeri Mohammad Dehghani Frank Werner Haider Ali Riyadh Kareem Jawad Ibraheem Kasim Ibraheem Kei Eguchi 《Computers, Materials & Continua》 2025年第5期2677-2718,共42页
In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions ... In this study,a completely different approach to optimization is introduced through the development of a novel metaheuristic algorithm called the Barber Optimization Algorithm(BaOA).Inspired by the human interactions between barbers and customers,BaOA captures two key processes:the customer’s selection of a hairstyle and the detailed refinement during the haircut.These processes are translated into a mathematical framework that forms the foundation of BaOA,consisting of two critical phases:exploration,representing the creative selection process,and exploitation,which focuses on refining details for optimization.The performance of BaOA is evaluated using 52 standard benchmark functions,including unimodal,high-dimensional multimodal,fixed-dimensional multimodal,and the Congress on Evolutionary Computation(CEC)2017 test suite.This comprehensive assessment highlights BaOA’s ability to balance exploration and exploitation effectively,resulting in high-quality solutions.A comparative analysis against twelve widely known metaheuristic algorithms further demonstrates BaOA’s superior performance,as it consistently delivers better results across most benchmark functions.To validate its real-world applicability,BaOA is tested on four engineering design problems,illustrating its capability to address practical challenges with remarkable efficiency.The results confirm BaOA’s versatility and reliability as an optimization tool.This study not only introduces an innovative algorithm but also establishes its effectiveness in solving complex problems,providing a foundation for future research and applications in diverse scientific and engineering domains. 展开更多
关键词 Optimization METAHEURISTIC barber HAIRSTYLE human-based algorithm exploration EXPLOITATION
在线阅读 下载PDF
Developing a platform to evaluate and assess the security of wearable devices 被引量:1
18
作者 Matthew L. Hale Kerolos Lotfy +2 位作者 Rose F. Gamble Charles Walter Jessica Lin 《Digital Communications and Networks》 SCIE 2019年第3期147-159,共13页
Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain smartphone application, a wearable can capture sensitive data about... Operating in a body area network around a smartphone user, wearables serve a variety of commercial, medical and personal uses. Depending on a certain smartphone application, a wearable can capture sensitive data about the user and provide critical, possibly life-or-death, functionality. When using wearables, security problems might occur on hardware/software of wearables, connected phone apps or web services devices, or Bluetooth channels used for communication. This paper develops an open source platform called SecuWear for identifying vulnerabilities in these areas and facilitating wearable security research to mitigate them. SecuWear supports the creation, evaluation, and analysis of security vulnerability tests on actual hardwares. Extending earlier results, this paper includes an empirical evaluation that demonstrates proof of concept attacks on commercial wearable devices and shows how SecuWear captures the information necessary for identifying such attacks. Also included is a process for releasing attack and mitigation information to the security community. 展开更多
关键词 BLUETOOTH LE Internet of THINGS Man-in-the-middle ATTACKS SECURITY VULNERABILITY discovery Wearables
在线阅读 下载PDF
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things 被引量:1
19
作者 Ahmad O.Aseeri Sajjad Hussain Chauhdary +2 位作者 Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang 《Computers, Materials & Continua》 SCIE EI 2023年第4期1901-1918,共18页
IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted... IoT devices rely on authentication mechanisms to render secure message exchange.During data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT devices.The application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped agreement.This paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT devices.PUF has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device communication.An IoT network gathers information of interest from multiple cluster members selected by the proposed framework.In addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT platform.Simulation analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance ratio.By enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec. 展开更多
关键词 Cyber-physical systems security data aggregation Internet of Things physical unclonable function swarm intelligences
在线阅读 下载PDF
Architecting the Metaverse: Blockchain and the Financial and Legal Regulatory Challenges of Virtual Real Estate 被引量:1
20
作者 James Hutson Gaurango Banerjee +2 位作者 Naresh Kshetri Kurt Odenwald Jeremiah Ratican 《Journal of Intelligent Learning Systems and Applications》 2023年第1期1-23,共23页
There has been disagreement over the value of purchasing space in the metaverse, but many businesses including Nike, The Wendy’s Company, and McDonald’s have jumped in headfirst. While the metaverse land rush has be... There has been disagreement over the value of purchasing space in the metaverse, but many businesses including Nike, The Wendy’s Company, and McDonald’s have jumped in headfirst. While the metaverse land rush has been called an “illusion” given underdeveloped infrastructure, including inadequate software and servers, and the potential opportunities for economic and legal abuse, the “real estate of the future” shows no signs of slowing. While the current virtual space of the metaverse is worth $6.30 billion, that is expected to grow to $84.09 billion by the end of 2028. But the long-term legal and regulatory considerations of capitalizing on the investment, as well as the manner in which blockchain technology can secure users’ data and digital assets, has yet to be properly investigated. With the metaverse still in a conceptual phase, building a new 3D social environment capable of digital transactions will represent most of the initial investment in time in human capital. Digital twin technologies, already well-established in industry, will be ported to support the need to architect and furnish the new digital world. The return on and viability of investing in the “real estate of the future” raises questions fundamental to the success or failure of the enterprise. As such this paper proposes a novel framing of the issue and looks at the intersection where finance, technology, and law are converging to prevent another Dot-com bubble of the late 1990s in metaverse-based virtual real estate transactions. Furthermore, the paper will argue that these domains are technologically feasible, but the main challenges for commercial users remain in the legal and regulatory arenas. As has been the case with the emergence of online commerce, a legal assessment of the metaverse indicates that courts will look to traditional and established legal principles when addressing issues until the enactment of federal and/or state statutes and accompanying regulations. Lastly, whereas traditional regulation of real estate would involve property law, the current legal framing of ownership of metaverse assets is governed by contract law. 展开更多
关键词 Blockchain Digital Real Estate Digital Retail Digital Twin Digital Content FINANCE Metaverse
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部