Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 3 de 3
Filter
Add more filters










Database
Language
Publication year range
1.
Network ; : 1-31, 2024 Jun 26.
Article in English | MEDLINE | ID: mdl-38932464

ABSTRACT

The early diagnosis of tumour is significant in biomedical research field to lower the severity level and restrict the process extension from cancer. Moreover, the detection of early sign of cancer is undertaken with extensive research efforts that dedicated to the disclosure and recognition of tumours. However, the limited data size as well as diverse appearance of images lowered the detection performance and failed to detect complex stage of tumour. So to solve these issues, a Weighted Adaptive Random Ensemble Support Vector-based Partial Reinforcement Search (WARES-PRS) algorithm is proposed that detected bone lesions accurately and also predicted the severity level stage efficiently. Further, the detection is performed with varied stages to diminish the presence of noise and undertaken effective classification. The performance is validated with CNUH dataset that enhanced image pre-processing tasks. Despite the proposed method uncover the mutual relationships between each pixel's local texture and the overall image's global context. The detection and classification efficiency is validated with various measures and the experimental results revealed that the detection accuracy is enhanced for the proposed approach by 98.5%. The outcomes of our study have exhibited a substantial contribution to assisting physicians in the detection of knee bone tumours.

2.
Network ; : 1-25, 2024 Mar 14.
Article in English | MEDLINE | ID: mdl-38482862

ABSTRACT

An Adaptive activation Functions with Deep Kronecker Neural Network optimized with Bear Smell Search Algorithm (BSSA) (ADKNN-BSSA-CSMANET) is proposed for preventing MANET Cyber security attacks. The mobile users are enrolled with Trusted Authority Using a Crypto Hash Signature (SHA-256). Every mobile user uploads their finger vein biometric, user ID, latitude and longitude for confirmation. The packet analyser checks if any attack patterns are identified. It is implemented using adaptive density-based spatial clustering (ADSC) that deems information from packet header. Geodesic filtering (GF) is used as a pre-processing method for eradicating the unsolicited content and filtering pertinent data. Group Teaching Algorithm (GTA)-based feature selection is utilized for ideal collection of features and Adaptive Activation Functions along Deep Kronecker Neural Network (ADKNN) is used to categorizing normal and attack packets (DoS, Probe, U2R, and R2L). Then BSSA is utilized for optimizing the weight parameters of ADKNN classifier for optimal classification. The proposed technique is executed in python and its efficiency is evaluated by several performances metrics, such as Accuracy, Attack Detection Rate, Detection Delay, Packet Delivery Ratio, Throughput, and Energy Consumption. The proposed technique provides 36.64%, 33.06%, and 33.98% lower Detection Delay on NSL-KDD dataset compared with the existing methods.

3.
Network ; 35(3): 278-299, 2024 Aug.
Article in English | MEDLINE | ID: mdl-38294002

ABSTRACT

Due to the massive growth in Internet of Things (IoT) devices, it is necessary to properly identify, authorize, and protect against attacks the devices connected to the particular network. In this manuscript, IoT Device Type Identification based on Variational Auto Encoder Wasserstein Generative Adversarial Network optimized with Pelican Optimization Algorithm (IoT-DTI-VAWGAN-POA) is proposed for Prolonging IoT Security. The proposed technique comprises three phases, such as data collection, feature extraction, and IoT device type detection. Initially, real network traffic dataset is gathered by distinct IoT device types, like baby monitor, security camera, etc. For feature extraction phase, the network traffic feature vector comprises packet sizes, Mean, Variance, Kurtosis derived by Adaptive and concise empirical wavelet transforms. Then, the extracting features are supplied to VAWGAN is used to identify the IoT devices as known or unknown. Then Pelican Optimization Algorithm (POA) is considered to optimize the weight factors of VAWGAN for better IoT device type identification. The proposed IoT-DTI-VAWGAN-POA method is implemented in Python and proficiency is examined under the performance metrics, like accuracy, precision, f-measure, sensitivity, Error rate, computational complexity, and RoC. It provides 33.41%, 32.01%, and 31.65% higher accuracy, and 44.78%, 43.24%, and 48.98% lower error rate compared to the existing methods.


Subject(s)
Algorithms , Computer Security , Internet of Things , Neural Networks, Computer , Humans
SELECTION OF CITATIONS
SEARCH DETAIL
...