Network-Computation in Neural Systems最新文献

筛选
英文 中文
Retraction. 撤回。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-03 DOI: 10.1080/0954898X.2024.2385540
{"title":"Retraction.","authors":"","doi":"10.1080/0954898X.2024.2385540","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2385540","url":null,"abstract":"","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141890972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bolstering IoT security with IoT device type Identification using optimized Variational Autoencoder Wasserstein Generative Adversarial Network. 利用优化的变异自动编码器 Wasserstein 生成对抗网络识别物联网设备类型,增强物联网安全性。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-01 Epub Date: 2024-01-31 DOI: 10.1080/0954898X.2024.2304214
Jothi Shri Sankar, Saravanan Dhatchnamurthy, Anitha Mary X, Keerat Kumar Gupta
{"title":"Bolstering IoT security with IoT device type Identification using optimized Variational Autoencoder Wasserstein Generative Adversarial Network.","authors":"Jothi Shri Sankar, Saravanan Dhatchnamurthy, Anitha Mary X, Keerat Kumar Gupta","doi":"10.1080/0954898X.2024.2304214","DOIUrl":"10.1080/0954898X.2024.2304214","url":null,"abstract":"<p><p>Due to the massive growth in Internet of Things (IoT) devices, it is necessary to properly identify, authorize, and protect against attacks the devices connected to the particular network. In this manuscript, IoT Device Type Identification based on Variational Auto Encoder Wasserstein Generative Adversarial Network optimized with Pelican Optimization Algorithm (IoT-DTI-VAWGAN-POA) is proposed for Prolonging IoT Security. The proposed technique comprises three phases, such as data collection, feature extraction, and IoT device type detection. Initially, real network traffic dataset is gathered by distinct IoT device types, like baby monitor, security camera, etc. For feature extraction phase, the network traffic feature vector comprises packet sizes, Mean, Variance, Kurtosis derived by Adaptive and concise empirical wavelet transforms. Then, the extracting features are supplied to VAWGAN is used to identify the IoT devices as known or unknown. Then Pelican Optimization Algorithm (POA) is considered to optimize the weight factors of VAWGAN for better IoT device type identification. The proposed IoT-DTI-VAWGAN-POA method is implemented in Python and proficiency is examined under the performance metrics, like accuracy, precision, f-measure, sensitivity, Error rate, computational complexity, and RoC. It provides 33.41%, 32.01%, and 31.65% higher accuracy, and 44.78%, 43.24%, and 48.98% lower error rate compared to the existing methods.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139643428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved deep belief network for estimating mango quality indices and grading: A computer vision-based neutrosophic approach. 用于估算芒果质量指标和分级的改进型深度信念网络:基于计算机视觉的中性方法。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-01 Epub Date: 2024-01-15 DOI: 10.1080/0954898X.2023.2299851
Mukesh Kumar Tripathi, Shivendra
{"title":"Improved deep belief network for estimating mango quality indices and grading: A computer vision-based neutrosophic approach.","authors":"Mukesh Kumar Tripathi, Shivendra","doi":"10.1080/0954898X.2023.2299851","DOIUrl":"10.1080/0954898X.2023.2299851","url":null,"abstract":"<p><p>This research introduces a revolutionary machinet learning algorithm-based quality estimation and grading system. The suggested work is divided into four main parts: Ppre-processing, neutroscopic model transformation, Feature Extraction, and Grading. The raw images are first pre-processed by following five major stages: read, resize, noise removal, contrast enhancement via CLAHE, and Smoothing via filtering. The pre-processed images are then converted into a neutrosophic domain for more effective mango grading. The image is processed under a new Geometric Mean based neutrosophic approach to transforming it into the neutrosophic domain. Finally, the prediction of TSS for the different chilling conditions is done by Improved Deep Belief Network (IDBN) and based on this; the grading of mango is done automatically as the model is already trained with it. Here, the prediction of TSS is carried out under the consideration of SSC, firmness, and TAC. A comparison between the proposed and traditional methods is carried out to confirm the efficacy of various metrics.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139467171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
M2AI-CVD: Multi-modal AI approach cardiovascular risk prediction system using fundus images. M2AI-CVD:使用眼底图像的多模态人工智能心血管风险预测系统。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-01 Epub Date: 2024-01-27 DOI: 10.1080/0954898X.2024.2306988
Premalatha Gurumurthy, Manjunathan Alagarsamy, Sangeetha Kuppusamy, Niranjana Chitra Ponnusamy
{"title":"M2AI-CVD: Multi-modal AI approach cardiovascular risk prediction system using fundus images.","authors":"Premalatha Gurumurthy, Manjunathan Alagarsamy, Sangeetha Kuppusamy, Niranjana Chitra Ponnusamy","doi":"10.1080/0954898X.2024.2306988","DOIUrl":"10.1080/0954898X.2024.2306988","url":null,"abstract":"<p><p>Cardiovascular diseases (CVD) represent a significant global health challenge, often remaining undetected until severe cardiac events, such as heart attacks or strokes, occur. In regions like Qatar, research focused on non-invasive CVD identification methods, such as retinal imaging and dual-energy X-ray absorptiometry (DXA), is limited. This study presents a groundbreaking system known as Multi-Modal Artificial Intelligence for Cardiovascular Disease (M2AI-CVD), designed to provide highly accurate predictions of CVD. The M2AI-CVD framework employs a four-fold methodology: First, it rigorously evaluates image quality and processes lower-quality images for further analysis. Subsequently, it uses the Entropy-based Fuzzy C Means (EnFCM) algorithm for precise image segmentation. The Multi-Modal Boltzmann Machine (MMBM) is then employed to extract relevant features from various data modalities, while the Genetic Algorithm (GA) selects the most informative features. Finally, a ZFNet Convolutional Neural Network (ZFNetCNN) classifies images, effectively distinguishing between CVD and Non-CVD cases. The research's culmination, tested across five distinct datasets, yields outstanding results, with an accuracy of 95.89%, sensitivity of 96.89%, and specificity of 98.7%. This multi-modal AI approach offers a promising solution for the accurate and early detection of cardiovascular diseases, significantly improving the prospects of timely intervention and improved patient outcomes in the realm of cardiovascular health.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139572032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State identification for a class of uncertain switched systems by differential neural networks. 用微分神经网络识别一类不确定开关系统的状态。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-01 Epub Date: 2024-01-11 DOI: 10.1080/0954898X.2023.2296115
Isaac Chairez, Alejandro Garcia-Gonzalez, Alberto Luviano-Juarez
{"title":"State identification for a class of uncertain switched systems by differential neural networks.","authors":"Isaac Chairez, Alejandro Garcia-Gonzalez, Alberto Luviano-Juarez","doi":"10.1080/0954898X.2023.2296115","DOIUrl":"10.1080/0954898X.2023.2296115","url":null,"abstract":"<p><p>This paper presents a non-parametric identification scheme for a class of uncertain switched nonlinear systems based on continuous-time neural networks. This scheme is based on a continuous neural network identifier. This adaptive identifier guaranteed the convergence of the identification errors to a small vicinity of the origin. The convergence of the identification error was determined by the Lyapunov theory supported by a practical stability variation for switched systems. The same stability analysis generated the learning laws that adjust the identifier structure. The upper bound of the convergence region was characterized in terms of uncertainties and noises affecting the switched system. A second finite-time convergence learning law was also developed to describe an alternative way of forcing the identification error's stability. The study presented in this paper described a formal technique for analysing the application of adaptive identifiers based on continuous neural networks for uncertain switched systems. The identifier was tested for two basic problems: a simple mechanical system and a switched representation of the human gait model. In both cases, accurate results for the identification problem were achieved.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139418624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and privacy improved cloud user authentication in biometric multimodal multi fusion using blockchain-based lightweight deep instance-based DetectNet. 使用基于区块链的轻量级深度实例检测网络,在生物识别多模态多融合中提高云用户身份验证的安全性和隐私性。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-08-01 Epub Date: 2024-01-31 DOI: 10.1080/0954898X.2024.2304707
Selvarani Poomalai, Keerthika Venkatesan, Surendran Subbaraj, Sundar Radha
{"title":"Secure and privacy improved cloud user authentication in biometric multimodal multi fusion using blockchain-based lightweight deep instance-based DetectNet.","authors":"Selvarani Poomalai, Keerthika Venkatesan, Surendran Subbaraj, Sundar Radha","doi":"10.1080/0954898X.2024.2304707","DOIUrl":"10.1080/0954898X.2024.2304707","url":null,"abstract":"<p><p>This research introduces an innovative solution addressing the challenge of user authentication in cloud-based systems, emphasizing heightened security and privacy. The proposed system integrates multimodal biometrics, deep learning (Instance-based learning-based DetectNet-(IL-DN), privacy-preserving techniques, and blockchain technology. Motivated by the escalating need for robust authentication methods in the face of evolving cyber threats, the research aims to overcome the struggle between accuracy and user privacy inherent in current authentication methods. The proposed system swiftly and accurately identifies users using multimodal biometric data through IL-DN. To address privacy concerns, advanced techniques are employed to encode biometric data, ensuring user privacy. Additionally, the system utilizes blockchain technology to establish a decentralized, tamper-proof, and transparent authentication system. This is reinforced by smart contracts and an enhanced Proof of Work (PoW) mechanism. The research rigorously evaluates performance metrics, encompassing authentication accuracy, privacy preservation, security, and resource utilization, offering a comprehensive solution for secure and privacy-enhanced user authentication in cloud-based environments. This work significantly contributes to filling the existing research gap in this critical domain.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139643429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retraction. 撤回。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-07-31 DOI: 10.1080/0954898X.2024.2385532
{"title":"Retraction.","authors":"","doi":"10.1080/0954898X.2024.2385532","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2385532","url":null,"abstract":"","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141857223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet-of-Things for smart irrigation control and crop recommendation using interactive guide-deep model in Agriculture 4.0 applications. 在农业 4.0 应用中使用交互式深度引导模型进行智能灌溉控制和作物推荐的物联网。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-07-31 DOI: 10.1080/0954898X.2024.2383893
Smita Sandeep Mane, Vaibhav E Narawade
{"title":"Internet-of-Things for smart irrigation control and crop recommendation using interactive guide-deep model in Agriculture 4.0 applications.","authors":"Smita Sandeep Mane, Vaibhav E Narawade","doi":"10.1080/0954898X.2024.2383893","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2383893","url":null,"abstract":"<p><p>The rapid advancements in Agriculture 4.0 have led to the development of the continuous monitoring of the soil parameters and recommend crops based on soil fertility to improve crop yield. Accordingly, the soil parameters, such as pH, nitrogen, phosphorous, potassium, and soil moisture are exploited for irrigation control, followed by the crop recommendation of the agricultural field. The smart irrigation control is performed utilizing the Interactive guide optimizer-Deep Convolutional Neural Network (Interactive guide optimizer-DCNN), which supports the decision-making regarding the soil nutrients. Specifically, the Interactive guide optimizer-DCNN classifier is designed to replace the standard ADAM algorithm through the modeled interactive guide optimizer, which exhibits alertness and guiding characters from the nature-inspired dog and cat population. In addition, the data is down-sampled to reduce redundancy and preserve important information to improve computing performance. The designed model attains an accuracy of 93.11 % in predicting the minerals, pH value, and soil moisture thereby, exhibiting a higher recommendation accuracy of 97.12% when the model training is fixed at 90%. Further, the developed model attained the <i>F</i>-score, specificity, sensitivity, and accuracy values of 90.30%, 92.12%, 89.56%, and 86.36% with <i>k</i>-fold 10 in predicting the minerals that revealed the efficacy of the model.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141857222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fourfold-objective-based cloud privacy preservation model with proposed association rule hiding and deep learning assisted optimal key generation. 基于四重目标的云隐私保护模型,建议关联规则隐藏和深度学习辅助最优密钥生成。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-07-26 DOI: 10.1080/0954898X.2024.2378836
Smita Sharma, Sanjay Tyagi
{"title":"A fourfold-objective-based cloud privacy preservation model with proposed association rule hiding and deep learning assisted optimal key generation.","authors":"Smita Sharma, Sanjay Tyagi","doi":"10.1080/0954898X.2024.2378836","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2378836","url":null,"abstract":"<p><p>Numerous studies have been conducted in an attempt to preserve cloud privacy, yet the majority of cutting-edge solutions fall short when it comes to handling sensitive data. This research proposes a \"privacy preservation model in the cloud environment\". The four stages of recommended security preservation methodology are \"identification of sensitive data, generation of an optimal tuned key, suggested data sanitization, and data restoration\". Initially, owner's data enters the Sensitive data identification process. The sensitive information in the input (owner's data) is identified via Augmented Dynamic Itemset Counting (ADIC) based Associative Rule Mining Model. Subsequently, the identified sensitive data are sanitized via the newly created tuned key. The generated tuned key is formulated with new fourfold objective-hybrid optimization approach-based deep learning approach. The optimally tuned key is generated with LSTM on the basis of fourfold objectives and the new hybrid MUAOA. The created keys, as well as generated sensitive rules, are fed into the deep learning model. The MUAOA technique is a conceptual blend of standard AOA and CMBO, respectively. As a result, unauthorized people will be unable to access information. Finally, comparative evaluation is undergone and proposed LSTM+MUAOA has achieved higher values on privacy about 5.21 compared to other existing models.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141762714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing effort estimation in global software development using a unique combination of Neuro Fuzzy Logic and Deep Learning Neural Networks (NFDLNN). 利用神经模糊逻辑和深度学习神经网络(NFDLNN)的独特组合,加强全球软件开发中的工作量估算。
IF 1.1 3区 计算机科学
Network-Computation in Neural Systems Pub Date : 2024-07-21 DOI: 10.1080/0954898X.2024.2376703
Manoj Ray Devadas, Philip Samuel
{"title":"Enhancing effort estimation in global software development using a unique combination of Neuro Fuzzy Logic and Deep Learning Neural Networks (NFDLNN).","authors":"Manoj Ray Devadas, Philip Samuel","doi":"10.1080/0954898X.2024.2376703","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2376703","url":null,"abstract":"<p><p>Effective project planning and management in the global software development landscape relies on addressing major issues like cost estimation and effort allocation. Timely estimation of software development is a critical focus in software engineering research. With the industry increasingly relying on diverse teams worldwide, accurate estimation becomes vital. Software size serves as a common measure for costs and schedules, but advanced estimation methods consider various variables, such as project purpose, personnel expertise, time and efficiency constraints, and technology requirements. Estimating software costs involve significant financial and strategic commitments, making it crucial to address complexity and versatility related to cost drivers. To achieve enhanced accuracy and convergence, we employ the cuckoo algorithm in our proposed NFDLNN (Neuro Fuzzy Logic and Deep Learning Neural Networks) model. Through extensive validation with industrial project data, using Function Point Analysis as the algorithmic models, our NFA model demonstrates high accuracy in software cost approximation, outperforming existing methods insights of MRE of 3.33, BRE of 0.13, and PI of 74.48. Our research contributes to improved project planning and decision-making processes in global software development endeavours.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141735684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信