期刊文献+
共找到3,723篇文章
< 1 2 187 >
每页显示 20 50 100
Computational Assessment of Information System Reliability Using Hybrid MCDM Models
1
作者 Nurbek Sissenov Gulden Ulyukova +1 位作者 Dina Satybaldina Nikolaj Goranin 《Computers, Materials & Continua》 2026年第5期1805-1829,共25页
The reliability of information systems(IS)is a key factor in the sustainable operation of modern digital services.However,existing assessment methods remain fragmented and are often limited to individual indicators or... The reliability of information systems(IS)is a key factor in the sustainable operation of modern digital services.However,existing assessment methods remain fragmented and are often limited to individual indicators or expert judgments.This paper proposes a hybridmethodology for a comprehensive assessment of IS reliability based on the integration of the international standard ISO/IEC 25010:2023,multicriteria analysismethods(ARAS,CoCoSo,and TOPSIS),and theXGBoostmachine learning algorithmfor missing data imputation.Thestructure of the ISO/IEC 25010 standard is used to formalize reliability criteria and subcriteria,while theAHP method allows for the calculation of their weighting coefficients based on expert assessments.The XGBoost algorithm ensures the correct filling of gaps in the source data,increasing the completeness and reliability of the subsequent assessment.The resulting weighted indicators are aggregated using threeMCDMmethods,after which an integral reliability indicator is formed as a percentage.The methodology was tested on six real-world information systems with different architectures.The results demonstrated high consistency between the ARAS,CoCoSo,and TOPSISmethods,as well as the stability of the final rating when the criterion weights vary by±10%.The proposed approach provides a reproducible,transparent,and objective assessment of information system reliability and can be used to identify system bottlenecks,make modernization decisions,and manage the quality of digital infrastructure. 展开更多
关键词 Information system reliability ISO/IEC 25010:2023 multi-criteria method ARAS CoCoSo TOPSIS AHP machine learning extreme gradient boosting
在线阅读 下载PDF
MVI-Depth:Multi-View Indoor Depth Estimation Based on the Fusion of Semantic Information
2
作者 Ying Zhu Buyun Chen +1 位作者 Hong Liu Xia Li 《CAAI Transactions on Intelligence Technology》 2026年第1期98-110,共13页
Compared to monocular depth estimation,multi-view depth estimation often yields more accurate results.However,traditional multi-view depth estimation methods often fail to leverage semantic information fully and strug... Compared to monocular depth estimation,multi-view depth estimation often yields more accurate results.However,traditional multi-view depth estimation methods often fail to leverage semantic information fully and struggle to effectively fuse information from multiple views,leading to suboptimal prediction performance in challenging scenarios such as texture-less regions and reflective surfaces.To address these limitations,we present MVI-Depth,a novel framework with two core innovations:(1)a Semantic Fusion Module(SFM)that establishes semantic correspondence,and(2)a Depth Updating Module(DUM)enabling iterative depth refinement.Specifically,MVI-Depth initially establishes a main view representation that integrates single-view depth,depth features,and semantic features.Subsequent feature extraction from neighbouring views enables the construction of the original cost volume.Recognising the inherent limitations of direct cost volume utilisation in complex scenes,the proposed SFM constructs an aligned semantic cost volume to utilise the complementarity between semantic and depth information,forming an improved final cost volume.The final cost volume is updated through the proposed DUM to achieve iterative depth optimisation.Comprehensive evaluations demonstrate that MVI-Depth achieves superior performance across all standard metrics on both ScanNet and KITTI benchmarks,outperforming existing methods.Additional experiments on the 7-Scenes dataset further confirm the framework's robust generalisation capabilities in diverse environments. 展开更多
关键词 computer vision deep learning depth
在线阅读 下载PDF
Distributed Connected Dominating Set Algorithm to Enhance Connectivity of Wireless Nodes in Internet of Things Networks
3
作者 Dina S.M.Hassan Reem Ibrahim Alkanhel +1 位作者 Thuraya Alrumaih Shiyam Alalmaei 《Computers, Materials & Continua》 2026年第5期1625-1645,共21页
The sustainability of the Internet of Things(IoT)involves various issues,such as poor connectivity,scalability problems,interoperability issues,and energy inefficiency.Although the Sixth Generation of mobile networks(... The sustainability of the Internet of Things(IoT)involves various issues,such as poor connectivity,scalability problems,interoperability issues,and energy inefficiency.Although the Sixth Generation of mobile networks(6G)allows for Ultra-Reliable Low-Latency Communication(URLLC),enhanced Mobile Broadband(eMBB),and massive Machine-Type Communications(mMTC)services,it faces deployment challenges such as the short range of sub-THz and THz frequency bands,low capability to penetrate obstacles,and very high path loss.This paper presents a network architecture to enhance the connectivity of wireless IoT mesh networks that employ both 6G and Wi-Fi technologies.In this architecture,local communications are carried through the mesh network,which uses a virtual backbone to relay packets to local nodes,while remote communications are carried through the 6G network.The virtual backbone is created using a heuristic distributed ConnectedDominating Set(CDS)algorithm.In this algorithm,each node uses information collected from its one-and two-hop neighbors to determine its role and find the set of expansion nodes that are used to select the next CDS nodes.The proposed algorithm has O(n)message and O(K)time complexities,where n is the number of nodes in the network,and K is the depth of the cluster.The study proved that the approximation ratio of the algorithmhas an upper bound of 2.06748(3.4306MCDS+4.8185).Performance evaluations compared the size of the CDS against the theoretical limit and recent CDS clustering algorithms.Results indicate that the proposed algorithm has the smallest average slope for the size of the CDS as the number of nodes increases. 展开更多
关键词 Connected dominating sets CDS virtual backbone unit disk graph UDG mIoT multi-RAT
在线阅读 下载PDF
AI-based augmentation of prediction potential for asphalts
4
作者 Filippo Giammaria Praticò Vamsi Navya Krishna Mypati 《Journal of Road Engineering》 2026年第1期1-22,共22页
There is a lack of studies when dealing with the comparison between regression methods and machine learning(ML)-type methods in terms of their ability to interpret and describe how the components of a bituminous mixtu... There is a lack of studies when dealing with the comparison between regression methods and machine learning(ML)-type methods in terms of their ability to interpret and describe how the components of a bituminous mixture affect mechanistic performance.At the same time,artificial intelligence(AI)-driven approaches are becoming more popular in analysing asphalt mixtures,yet there are limited comparisons of regression and machine learning(ML)models for mechanistic performance interpretation.Consequently,a comparison of AI and statistical approaches is presented in this study for predicting bituminous mixture properties such as stiffness,fatigue resistance,and tensile strength.Some of the important input features are bitumen content,crumb rubber content,and air void content.The research uses random forest model(RFM),linear regression model(LRM),and polynomial regression model(PRM).RFM and PRM achieved an R^(2) as high as 0.94,with mean absolute error(MAE)less than 2.5,and are,therefore,good predictive models.Interestingly,RFM works best in one-third of instances,particularly when dealing with outliers,whereas traditional statistical models work better in two-thirds of instances.The results highlight AI's value in bituminous mixture optimisation,where RFM showed good prediction accuracy.In 30%of the cases,AI models outperformed the conventional statistical approaches.At the same time,analyses show that model performance varies significantly with scenarios and that even if AI models capture complex nonlinear relationships,they must not override DOE principles. 展开更多
关键词 Machine learning Random forest model Linear regression model Polynomial regression model
在线阅读 下载PDF
Impact of Data Processing Techniques on AI Models for Attack-Based Imbalanced and Encrypted Traffic within IoT Environments
5
作者 Yeasul Kim Chaeeun Won Hwankuk Kim 《Computers, Materials & Continua》 2026年第1期247-274,共28页
With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comp... With the increasing emphasis on personal information protection,encryption through security protocols has emerged as a critical requirement in data transmission and reception processes.Nevertheless,IoT ecosystems comprise heterogeneous networks where outdated systems coexist with the latest devices,spanning a range of devices from non-encrypted ones to fully encrypted ones.Given the limited visibility into payloads in this context,this study investigates AI-based attack detection methods that leverage encrypted traffic metadata,eliminating the need for decryption and minimizing system performance degradation—especially in light of these heterogeneous devices.Using the UNSW-NB15 and CICIoT-2023 dataset,encrypted and unencrypted traffic were categorized according to security protocol,and AI-based intrusion detection experiments were conducted for each traffic type based on metadata.To mitigate the problem of class imbalance,eight different data sampling techniques were applied.The effectiveness of these sampling techniques was then comparatively analyzed using two ensemble models and three Deep Learning(DL)models from various perspectives.The experimental results confirmed that metadata-based attack detection is feasible using only encrypted traffic.In the UNSW-NB15 dataset,the f1-score of encrypted traffic was approximately 0.98,which is 4.3%higher than that of unencrypted traffic(approximately 0.94).In addition,analysis of the encrypted traffic in the CICIoT-2023 dataset using the same method showed a significantly lower f1-score of roughly 0.43,indicating that the quality of the dataset and the preprocessing approach have a substantial impact on detection performance.Furthermore,when data sampling techniques were applied to encrypted traffic,the recall in the UNSWNB15(Encrypted)dataset improved by up to 23.0%,and in the CICIoT-2023(Encrypted)dataset by 20.26%,showing a similar level of improvement.Notably,in CICIoT-2023,f1-score and Receiver Operation Characteristic-Area Under the Curve(ROC-AUC)increased by 59.0%and 55.94%,respectively.These results suggest that data sampling can have a positive effect even in encrypted environments.However,the extent of the improvement may vary depending on data quality,model architecture,and sampling strategy. 展开更多
关键词 Encrypted traffic attack detection data sampling technique AI-based detection IoT environment
在线阅读 下载PDF
Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning
6
作者 Misbah Anwer Ghufran Ahmed +3 位作者 Maha Abdelhaq Raed Alsaqour Shahid Hussain Adnan Akhunzada 《Computers, Materials & Continua》 2026年第1期744-758,共15页
The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)an... The exponential growth of the Internet of Things(IoT)has introduced significant security challenges,with zero-day attacks emerging as one of the most critical and challenging threats.Traditional Machine Learning(ML)and Deep Learning(DL)techniques have demonstrated promising early detection capabilities.However,their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints,high computational costs,and the costly time-intensive process of data labeling.To address these challenges,this study proposes a Federated Learning(FL)framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in IoT networks.By employing Deep Neural Networks(DNNs)and decentralized model training,the approach reduces computational complexity while improving detection accuracy.The proposed model demonstrates robust performance,achieving accuracies of 94.34%,99.95%,and 87.94%on the publicly available kitsune,Bot-IoT,and UNSW-NB15 datasets,respectively.Furthermore,its ability to detect zero-day attacks is validated through evaluations on two additional benchmark datasets,TON-IoT and IoT-23,using a Deep Federated Learning(DFL)framework,underscoring the generalization and effectiveness of the model in heterogeneous and decentralized IoT environments.Experimental results demonstrate superior performance over existing methods,establishing the proposed framework as an efficient and scalable solution for IoT security. 展开更多
关键词 Cyber-attack intrusion detection system(IDS) deep federated learning(DFL) zero-day attack distributed denial of services(DDoS) MULTI-CLASS Internet of Things(IoT)
在线阅读 下载PDF
Research on intelligent identification of Traditional Chinese Medicine constitutions based on multi-model fusion
7
作者 YUE Yao CAI Xiaohong 《Journal of Traditional Chinese Medicine》 2026年第1期226-235,共10页
OBJECTIVE:To develop an automated system for identifying and classifying constitution types in Traditional Chinese Medicine(TCM)by leveraging multi-model fusion algorithms.METHODS:A condensed version of a physical inf... OBJECTIVE:To develop an automated system for identifying and classifying constitution types in Traditional Chinese Medicine(TCM)by leveraging multi-model fusion algorithms.METHODS:A condensed version of a physical information collection form was designed to facilitate efficient data acquisition.The collected data were analyzed using a multi-model fusion approach,which integrated several machine learning techniques.These included support vector machines,Naive Bayes,decision trees,random forests,logistic regression,multilayer perceptrons,K-nearest neighbors,gradient boosting,adaptive ensemble learning,and recurrent neural networks.A soft voting strategy was used to combine the predictive outputs of each model,enabling the selection of the most effective model combination.RESULTS:The classification models demonstrated consistent and robust performance across most TCM constitution types when enhanced by the multi-model fusion strategy.In particular,high levels of accuracy,precision,recall,and F1-score were achieved for constitution types such as Yang deficiency,Qi deficiency,and Qi stagnation.However,the classification performance for the Yin deficiency constitution was relatively lower,indicating the need for further refinement and optimization in future research.CONCLUSION:This study introduces a novel,automated method for classifying TCM constitution types through the application of multi-model fusion algorithms.The approach simplifies the complex task of constitution identification while offering a practical and theoretical framework for the intelligent diagnosis of TCM body types.The findings have the potential to enhance personalized health management and support clinical decision-making in TCM diagnosis and treatment. 展开更多
关键词 multi-model fusion ALGORITHMS Traditional Chinese Medicine constitution voting classifier
原文传递
An Integrated Framework of Feature Engineering and Machine Learning for Large-Scale Energy Anomaly Detection
8
作者 Thanyapisit Buaprakhong Varintorn Sithisint +4 位作者 Awirut Phusaensaart Sinthon Wilke Thatsamaphon Boonchuntuk Thittaporn Ganokratanaa Mahasak Ketcham 《Energy Engineering》 2026年第3期326-360,共35页
The rapid digitalization of the energy sector has led to the deployment of large-scale smart metering systems that generate high-frequency time series data,creating new opportunities and challenges for energy anomaly ... The rapid digitalization of the energy sector has led to the deployment of large-scale smart metering systems that generate high-frequency time series data,creating new opportunities and challenges for energy anomaly detection.Accurate identification of anomalous patterns in building energy consumption is essential for optimizing operations,improving energy efficiency,and supporting grid reliability.This study investigates advanced feature engineering and machine learning modeling techniques for large-scale time series anomaly detection in building energy systems.Expanding upon previous benchmark frameworks,we introduce additional features such as oil price indices and solar cycle indicators,including sunset and sunrise times,to enhance the contextual understanding of consumption patterns.Our comparative modeling approach encompasses an extensive suite of algorithms,including KNeighborsUnif,KNeighborsDist,LightGBMXT,LightGBM,RandomForestMSE,CatBoost,ExtraTreesMSE,NeuralNetFastAI,XGBoost,NeuralNetTorch,and LightGBMLarge.Data preprocessing includes rigorous handling of missing values and normalization,while feature engineering focuses on temporal,environmental,and value-change attributes.The models are evaluated on a comprehensive dataset of smart meter readings,with performance assessed using metrics such as the Area Under the Receiver Operating Characteristic Curve(AUC-ROC).The results demonstrate that the integration of diverse exogenous variables and a hybrid ensemble of traditional tree-based and neural network models can significantly improve anomaly detection performance.This work provides new insights into the design of robust,scalable,and generalizable frameworks for energy anomaly detection in complex,real-world settings. 展开更多
关键词 Building energy smart meter anomaly detection supervised learning CLASSIFICATION
在线阅读 下载PDF
Machine Learning Based Simulation,Synthesis,and Characterization of Zinc Oxide/Graphene Oxide Nanocomposite for Energy Storage Applications
9
作者 Tahir Mahmood Muhammad Waseem Ashraf +3 位作者 Shahzadi Tayyaba Muhammad Munir Babiker M.A.Abdel-Banat Hassan Ali Dinar 《Computers, Materials & Continua》 2026年第3期468-501,共34页
Artificial intelligence(AI)based models have been used to predict the structural,optical,mechanical,and electrochemical properties of zinc oxide/graphene oxide nanocomposites.Machine learning(ML)models such as Artific... Artificial intelligence(AI)based models have been used to predict the structural,optical,mechanical,and electrochemical properties of zinc oxide/graphene oxide nanocomposites.Machine learning(ML)models such as Artificial Neural Networks(ANN),Support Vector Regression(SVR),Multilayer Perceptron(MLP),and hybrid,along with fuzzy logic tools,were applied to predict the different properties like wavelength at maximum intensity(444 nm),crystallite size(17.50 nm),and optical bandgap(2.85 eV).While some other properties,such as energy density,power density,and charge transfer resistance,were also predicted with the help of datasets of 1000(80:20).In general,the energy parameters were predicted more accurately by hybrid models.The hydrothermal method was used to synthesize graphene oxide(GO)and zinc oxide(ZnO)nanocomposites.The increased surface area,conductivity,and stability of graphene oxide in zinc oxide nanoparticles make the composite an ideal option for energy storage.X-ray diffraction(XRD)confirmed the crystallite size of 17.41 nm for the nanocomposite and the presence of GO(12.8○)peaks.The scanning electron microscope(SEM)showed anchored wrinkled GO sheets on zinc oxide with an average particle size of 2.93μm.Energy-dispersive X-ray spectroscopy(EDX)confirmed the elemental composition,and Fouriertransform infrared spectroscopy(FTIR)revealed the impact of GO on functional groups and electrochemical behavior.Photoluminescence(PL)wavelength of(439 nm)and band gap of(2.81 eV)show that the material is suitable for energy applications in nanocomposites.Smart nanocomposite materials with improved performance in energy storage and related applications were fabricated by combining synthesis,characterization,fuzzy logic,and machine learning in this work. 展开更多
关键词 Graphene oxide nanocomposites fuzzy logic SUPERCAPACITOR optical properties machine learning energy storage
在线阅读 下载PDF
HCL Net: Deep Learning for Accurate Classification of Honeycombing Lung and Ground Glass Opacity in CT Images
10
作者 Hairul Aysa Abdul Halim Sithiq Liyana Shuib +1 位作者 Muneer Ahmad Chermaine Deepa Antony 《Computers, Materials & Continua》 2026年第1期999-1023,共25页
Honeycombing Lung(HCL)is a chronic lung condition marked by advanced fibrosis,resulting in enlarged air spaces with thick fibrotic walls,which are visible on Computed Tomography(CT)scans.Differentiating between normal... Honeycombing Lung(HCL)is a chronic lung condition marked by advanced fibrosis,resulting in enlarged air spaces with thick fibrotic walls,which are visible on Computed Tomography(CT)scans.Differentiating between normal lung tissue,honeycombing lungs,and Ground Glass Opacity(GGO)in CT images is often challenging for radiologists and may lead to misinterpretations.Although earlier studies have proposed models to detect and classify HCL,many faced limitations such as high computational demands,lower accuracy,and difficulty distinguishing between HCL and GGO.CT images are highly effective for lung classification due to their high resolution,3D visualization,and sensitivity to tissue density variations.This study introduces Honeycombing Lungs Network(HCL Net),a novel classification algorithm inspired by ResNet50V2 and enhanced to overcome the shortcomings of previous approaches.HCL Net incorporates additional residual blocks,refined preprocessing techniques,and selective parameter tuning to improve classification performance.The dataset,sourced from the University Malaya Medical Centre(UMMC)and verified by expert radiologists,consists of CT images of normal,honeycombing,and GGO lungs.Experimental evaluations across five assessments demonstrated that HCL Net achieved an outstanding classification accuracy of approximately 99.97%.It also recorded strong performance in other metrics,achieving 93%precision,100%sensitivity,89%specificity,and an AUC-ROC score of 97%.Comparative analysis with baseline feature engineering methods confirmed the superior efficacy of HCL Net.The model significantly reduces misclassification,particularly between honeycombing and GGO lungs,enhancing diagnostic precision and reliability in lung image analysis. 展开更多
关键词 Deep learning honeycombing lung ground glass opacity Resnet50v2 multiclass classification
在线阅读 下载PDF
Prompt Injection Attacks on Large Language Models:A Survey of Attack Methods,Root Causes,and Defense Strategies
11
作者 Tongcheng Geng Zhiyuan Xu +1 位作者 Yubin Qu W.Eric Wong 《Computers, Materials & Continua》 2026年第4期134-185,共52页
Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that man... Large language models(LLMs)have revolutionized AI applications across diverse domains.However,their widespread deployment has introduced critical security vulnerabilities,particularly prompt injection attacks that manipulate model behavior through malicious instructions.Following Kitchenham’s guidelines,this systematic review synthesizes 128 peer-reviewed studies from 2022 to 2025 to provide a unified understanding of this rapidly evolving threat landscape.Our findings reveal a swift progression from simple direct injections to sophisticated multimodal attacks,achieving over 90%success rates against unprotected systems.In response,defense mechanisms show varying effectiveness:input preprocessing achieves 60%–80%detection rates and advanced architectural defenses demonstrate up to 95%protection against known patterns,though significant gaps persist against novel attack vectors.We identified 37 distinct defense approaches across three categories,but standardized evaluation frameworks remain limited.Our analysis attributes these vulnerabilities to fundamental LLM architectural limitations,such as the inability to distinguish instructions from data and attention mechanism vulnerabilities.This highlights critical research directions such as formal verification methods,standardized evaluation protocols,and architectural innovations for inherently secure LLM designs. 展开更多
关键词 Prompt injection attacks large language models defense mechanisms security evaluation
在线阅读 下载PDF
DriftXMiner: A Resilient Process Intelligence Approach for Safe and Transparent Detection of Incremental Concept Drift in Process Mining
12
作者 Puneetha B.H Manoj Kumar M.V +1 位作者 Prashanth B.S. Piyush Kumar Pareek 《Computers, Materials & Continua》 2026年第1期1086-1118,共33页
Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational,organizational,or regulatory factors.These changes,referred to as incremental con... Processes supported by process-aware information systems are subject to continuous and often subtle changes due to evolving operational,organizational,or regulatory factors.These changes,referred to as incremental concept drift,gradually alter the behavior or structure of processes,making their detection and localization a challenging task.Traditional process mining techniques frequently assume process stationarity and are limited in their ability to detect such drift,particularly from a control-flow perspective.The objective of this research is to develop an interpretable and robust framework capable of detecting and localizing incremental concept drift in event logs,with a specific emphasis on the structural evolution of control-flow semantics in processes.We propose DriftXMiner,a control-flow-aware hybrid framework that combines statistical,machine learning,and process model analysis techniques.The approach comprises three key components:(1)Cumulative Drift Scanner that tracks directional statistical deviations to detect early drift signals;(2)a Temporal Clustering and Drift-Aware Forest Ensemble(DAFE)to capture distributional and classification-level changes in process behavior;and(3)Petri net-based process model reconstruction,which enables the precise localization of structural drift using transition deviation metrics and replay fitness scores.Experimental validation on the BPI Challenge 2017 event log demonstrates that DriftXMiner effectively identifies and localizes gradual and incremental process drift over time.The framework achieves a detection accuracy of 92.5%,a localization precision of 90.3%,and an F1-score of 0.91,outperforming competitive baselines such as CUSUM+Histograms and ADWIN+Alpha Miner.Visual analyses further confirm that identified drift points align with transitions in control-flow models and behavioral cluster structures.DriftXMiner offers a novel and interpretable solution for incremental concept drift detection and localization in dynamic,process-aware systems.By integrating statistical signal accumulation,temporal behavior profiling,and structural process mining,the framework enables finegrained drift explanation and supports adaptive process intelligence in evolving environments.Its modular architecture supports extension to streaming data and real-time monitoring contexts. 展开更多
关键词 Process mining concept drift gradual drift incremental drift clustering ensemble techniques process model event log
在线阅读 下载PDF
Scalable and Resilient AI Framework for Malware Detection in Software-Defined Internet of Things
13
作者 Maha Abdelhaq Ahmad Sami Al-Shamayleh +2 位作者 Adnan Akhunzada Nikola Ivkovi´c Toobah Hasan 《Computers, Materials & Continua》 2026年第4期1307-1321,共15页
The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expo... The rapid expansion of the Internet of Things(IoT)and Edge Artificial Intelligence(AI)has redefined automation and connectivity acrossmodern networks.However,the heterogeneity and limited resources of IoT devices expose them to increasingly sophisticated and persistentmalware attacks.These adaptive and stealthy threats can evade conventional detection,establish remote control,propagate across devices,exfiltrate sensitive data,and compromise network integrity.This study presents a Software-Defined Internet of Things(SD-IoT)control-plane-based,AI-driven framework that integrates Gated Recurrent Units(GRU)and Long Short-TermMemory(LSTM)networks for efficient detection of evolving multi-vector,malware-driven botnet attacks.The proposed CUDA-enabled hybrid deep learning(DL)framework performs centralized real-time detection without adding computational overhead to IoT nodes.A feature selection strategy combining variable clustering,attribute evaluation,one-R attribute evaluation,correlation analysis,and principal component analysis(PCA)enhances detection accuracy and reduces complexity.The framework is rigorously evaluated using the N_BaIoT dataset under k-fold cross-validation.Experimental results achieve 99.96%detection accuracy,a false positive rate(FPR)of 0.0035%,and a detection latency of 0.18 ms,confirming its high efficiency and scalability.The findings demonstrate the framework’s potential as a robust and intelligent security solution for next-generation IoT ecosystems. 展开更多
关键词 AI-driven malware analysis advanced persistent malware(APM) AI-poweredmalware detection deep learning(DL) malware-driven botnets software-defined internet of things(SD-IoT)
在线阅读 下载PDF
A Comprehensive Literature Review of AI-Driven Application Mapping and Scheduling Techniques for Network-on-Chip Systems
14
作者 Naveed Ahmad Muhammad Kaleem +5 位作者 Mourad Elloumi Muhammad Azhar Mushtaq Ahlem Fatnassi Mohd Fazil Anas Bilal Abdulbasit A.Darem 《Computer Modeling in Engineering & Sciences》 2026年第1期118-155,共38页
Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance ... Network-on-Chip(NoC)systems are progressively deployed in connecting massively parallel megacore systems in the new computing architecture.As a result,application mapping has become an important aspect of performance and scalability,as current trends require the distribution of computation across network nodes/points.In this paper,we survey a large number of mapping and scheduling techniques designed for NoC architectures.This time,we concentrated on 3D systems.We take a systematic literature review approach to analyze existing methods across static,dynamic,hybrid,and machine-learning-based approaches,alongside preliminary AI-based dynamic models in recent works.We classify them into several main aspects covering power-aware mapping,fault tolerance,load-balancing,and adaptive for dynamic workloads.Also,we assess the efficacy of each method against performance parameters,such as latency,throughput,response time,and error rate.Key challenges,including energy efficiency,real-time adaptability,and reinforcement learning integration,are highlighted as well.To the best of our knowledge,this is one of the recent reviews that identifies both traditional and AI-based algorithms for mapping over a modern NoC,and opens research challenges.Finally,we provide directions for future work toward improved adaptability and scalability via lightweight learned models and hierarchical mapping frameworks. 展开更多
关键词 Application mapping mapping techniques NETWORK-ON-CHIP system on chip optimisation
在线阅读 下载PDF
Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing
15
作者 Ahmad Zia Nazia Azim +5 位作者 Bekarystankyzy Akbayan Khalid J.Alzahrani Ateeq Ur Rehman Faheem Ullah Khan Nouf Al-Kahtani Hend Khalid Alkahtani 《Computers, Materials & Continua》 2026年第3期1559-1588,共30页
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c... The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods. 展开更多
关键词 Computation offloading task scheduling cheetah optimizer fog computing optimization resource allocation internet of things
在线阅读 下载PDF
A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development
16
作者 Subhranshu Sekhar Tripathy Sujit Bebortta +3 位作者 Mazin Abed Mohammed Muhammet Deveci Haydar Abdulameer Marhoon Radek Martinek 《Digital Communications and Networks》 2026年第1期165-179,共15页
Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and... Practical applications of smart cities and the Internet of Things(IoT)have multiplied,posing many difficulties in network performance,dependability,and security.Concerns of accessibility,reliability,sustainability,and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems.Fog computing offers a foundation for various applications,including cognitive support,health and social services,intelligent transportation systems,and pervasive computing and communications.Fog computing can help enhance these apps'productivity and lower the end-to-end delay experienced by such time-sensitive applications.In this research,we propose a reliable and secure service delivery strategy at the network edge for smart cities.To improve the availability and dependability,along with the security of smart city applications,the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system.Simulation findings suggest a reduction of 40.3%in the delay incurred by each service request for highly dense areas and 60.6%for moderately dense environments.Furthermore,the system has low false-negative rates and high detection and accuracy rates,decreasing service requests 2%. 展开更多
关键词 Security Reliability Trustworthy computing Resource provisioning Threat detection Fog computing Internet of things
在线阅读 下载PDF
Explainable Hybrid AI Model for DDoS Detection in SDN-Enabled Internet of Vehicle
17
作者 Oumaima Saidani Nazia Azim +5 位作者 Ateeq Ur Rehman Akbayan Bekarystankyzy Hala Abdel Hameed Mostafa Mohamed R.Abonazel Ehab Ebrahim Mohamed Ebrahim Sarah Abu Ghazalah 《Computers, Materials & Continua》 2026年第5期499-526,共28页
The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobil... The convergence of Software Defined Networking(SDN)in Internet of Vehicles(IoV)enables a flexible,programmable,and globally visible network control architecture across Road Side Units(RSUs),cloud servers,and automobiles.While this integration enhances scalability and safety,it also raises sophisticated cyberthreats,particularly Distributed Denial of Service(DDoS)attacks.Traditional rule-based anomaly detection methods often struggle to detectmodern low-and-slowDDoS patterns,thereby leading to higher false positives.To this end,this study proposes an explainable hybrid framework to detect DDoS attacks in SDN-enabled IoV(SDN-IoV).The hybrid framework utilizes a Residual Network(ResNet)to capture spatial correlations and a Bi-Long Short-Term Memory(BiLSTM)to capture both forward and backward temporal dependencies in high-dimensional input patterns.To ensure transparency and trustworthiness,themodel integrates the Explainable AI(XAI)technique,i.e.,SHapley Additive exPlanations(SHAP).SHAP highlights the contribution of each feature during the decision-making process,facilitating security analysts to understand the rationale behind the attack classification decision.The SDN-IoV environment is created in Mininet-WiFi and SUMO,and the hybrid model is trained on the CICDDoS2019 security dataset.The simulation results reveal the efficacy of the proposed model in terms of standard performance metrics compared to similar baseline methods. 展开更多
关键词 Explainable AI software defined networking Internet of vehicles DDoS attack ResNet BiLSTM
在线阅读 下载PDF
How signaling and search costs affect information asymmetry in P2P lending:the economics of big data 被引量:8
18
作者 Jiaqi Yan Wayne Yu JLeon Zhao 《Financial Innovation》 2015年第1期279-289,共11页
In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based ... In the past decade,online Peer-to-Peer(P2P)lending platforms have transformed the lending industry,which has been historically dominated by commercial banks.Information technology breakthroughs such as big data-based financial technologies(Fintech)have been identified as important disruptive driving forces for this paradigm shift.In this paper,we take an information economics perspective to investigate how big data affects the transformation of the lending industry.By identifying how signaling and search costs are reduced by big data analytics for credit risk management of P2P lending,we discuss how information asymmetry is reduced in the big data era.Rooted in the lending business,we propose a theory on the economics of big data and outline a number of research opportunities and challenging issues. 展开更多
关键词 Lending industry P2P lending Big data Economics of big data Fintech Information economics
在线阅读 下载PDF
Methods for Controlling the Authenticity of Textual Information Transfer on the Basis of Statistical and Structural Redundancy 被引量:1
19
作者 Akmal R.Akhatov 《International Journal of Automation and computing》 EI 2012年第5期518-529,共12页
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ... In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization. 展开更多
关键词 AUTHENTICITY data transfer text element structural and statistical redundancy probability of non-detected mistakes
原文传递
The Rural Information-based Construction under the Perspective of Expanding Agricultural Industrial Chain 被引量:3
20
作者 ZHU Li ZHU Jing 《Asian Agricultural Research》 2012年第1期49-53,57,共6页
On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informati... On the basis of expounding connotation and significance of expansion of agricultural industrial chain,coupled with the connotation of rural informatization connotation,this article analyses the role of rural informatization in expanding agricultural industrial chain:it can enhance market competitiveness of industry chain,improve the operational efficiency of industry chain,and promote the income and quality of farmers in industry chain.Under the perspective of expanding agricultural industrial chain,this article puts forwards thinking about the construction of rural informatization as follows:first,give full play to the leading role of the government;second,strengthen the construction of information-based network facility;third,integrate information resources in rural areas,and improve the quality of information;fourth,build comprehensive information service platform in rural areas;fifth,improve organizational level of production and management of individual farmers;sixth,strengthen the construction of information-based personnel in rural areas;seventh,strengthen publicity and training,promote overall cultural quality and information awareness of farmers. 展开更多
关键词 Expansion of agricultural industrial chain Rural areas Information-based construction
在线阅读 下载PDF
上一页 1 2 187 下一页 到第
使用帮助 返回顶部