期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
1
作者 Nisreen Innab Ahmed Abdelgader Fadol Osman +4 位作者 Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh 《Computers, Materials & Continua》 SCIE EI 2024年第7期1325-1345,共21页
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise ... Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based institutions.Data indicates a persistent rise in phishing attacks.Moreover,these fraudulent schemes are progressively becoming more intricate,thereby rendering them more challenging to identify.Hence,it is imperative to utilize sophisticated algorithms to address this issue.Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors.Machine learning(ML)approaches can identify common characteristics in most phishing assaults.In this paper,we propose an ensemble approach and compare it with six machine learning techniques to determine the type of website and whether it is normal or not based on two phishing datasets.After that,we used the normalization technique on the dataset to transform the range of all the features into the same range.The findings of this paper for all algorithms are as follows in the first dataset based on accuracy,precision,recall,and F1-score,respectively:Decision Tree(DT)(0.964,0.961,0.976,0.968),Random Forest(RF)(0.970,0.964,0.984,0.974),Gradient Boosting(GB)(0.960,0.959,0.971,0.965),XGBoost(XGB)(0.973,0.976,0.976,0.976),AdaBoost(0.934,0.934,0.950,0.942),Multi Layer Perceptron(MLP)(0.970,0.971,0.976,0.974)and Voting(0.978,0.975,0.987,0.981).So,the Voting classifier gave the best results.While in the second dataset,all the algorithms gave the same results in four evaluation metrics,which indicates that each of them can effectively accomplish the prediction process.Also,this approach outperformed the previous work in detecting phishing websites with high accuracy,a lower false negative rate,a shorter prediction time,and a lower false positive rate. 展开更多
关键词 Social engineering ATTACKS phishing attacks machine learning SECURITY artificial intelligence
下载PDF
Performance Evaluation of Edge Detection Using Sobel, Homogeneity and Prewitt Algorithms 被引量:3
2
作者 Abdel Karim M. Baareh Ahmad Al-Jarrah +1 位作者 Ahmad M. Smadi Ghazi H. Shakah 《Journal of Software Engineering and Applications》 2018年第11期537-551,共15页
Edge detection considered as very important and fundamental tool in image processing. An image edge is a very sensitive place where the image information and details mostly placed on it. Different filters were used to... Edge detection considered as very important and fundamental tool in image processing. An image edge is a very sensitive place where the image information and details mostly placed on it. Different filters were used to detect and enhance these edges to improve the sharpness and raising the image clarity. The significance of this paper comes from the study, compare and evaluate the effects of three well-known edge detection techniques in a spatial domain, where this evaluation was performed using both subjective and objective manner to find out the best edge detection algorithm. The Sobel, Homogeneity and Prewitt algorithms were used on 2D gray-scale synthesis and real images in Jordan using C# programming language. According to the comparative results obtained using the three techniques, it was clearly found that Prewitt and Homogeneity algorithms performance were better than Sobel algorithm. Therefore, Prewitt and Homogeneity algorithms can be recommended as useful detection tools in edge detection. 展开更多
关键词 EDGE DETECTOR EDGE Enhancement EDGE Localization SMOOTHING Image Processing
下载PDF
Recognition of Arabic Sign Language (ArSL) Using Recurrent Neural Networks 被引量:1
3
作者 Manar Maraqa Farid Al-Zboun +1 位作者 Mufleh Dhyabat Raed Abu Zitar 《Journal of Intelligent Learning Systems and Applications》 2012年第1期41-52,共12页
The objective of this research is to introduce the use of different types of neural networks in human hand gesture recognition for static images as well as for dynamic gestures. This work focuses on the ability of neu... The objective of this research is to introduce the use of different types of neural networks in human hand gesture recognition for static images as well as for dynamic gestures. This work focuses on the ability of neural networks to assist in Arabic Sign Language (ArSL) hand gesture recognition. We have presented the use of feedforward neural networks and recurrent neural networks along with its different architectures;partially and fully recurrent networks. Then we have tested our proposed system;the results of the experiment have showed that the suggested system with the fully recurrent architecture has had a performance with an accuracy rate 95% for static gesture recognition. 展开更多
关键词 ARABIC Sign Language FEEDFORWARD NEURAL NETWORKS Recurrent NEURAL NETWORKS GESTURE RECOGNITION
下载PDF
Kinds and Levels of Questions Raised by EFL Teachers and 10th-Grade Students Through Classroom Interaction
4
作者 Mahmoud Ali Al-Sobh Fawwaz Al-Abed Al-Haq Ahmad Mahmoud Shatnawi 《Sino-US English Teaching》 2013年第6期413-423,共11页
关键词 中学 英语 课外阅读 阅读材料
下载PDF
Voice Quality for Internet Protocol Based on Neural Network Model
5
作者 Hassan Al-Wahshat Mohammed Al-Maitah Takialddin Al-Smadi 《Journal of Signal and Information Processing》 2017年第4期195-202,共8页
The constant growth of the number of Internet users places new demands on the bandwidth of modern communication. The World Wide Web has led to the emergence of various types of traffic, Graphics information, voice dat... The constant growth of the number of Internet users places new demands on the bandwidth of modern communication. The World Wide Web has led to the emergence of various types of traffic, Graphics information, voice data, as well as various video applications demanding their special requirements for such networks. To meet all the requests, one increase of the network is not enough. As the number of Internet users and the various networks annex offices in-creases with each passing day, network needs a means of control that would ensure the support of both existing and new applications and services. There is still a need to address a number of issues before it announces the VoIP as the ultimate replacement of the traditional telephone network. This work provides an overview of the major benefits of VoIP network, as well as the presentation of a new way around the problem of ensuring the high quality of service for VoIP protocol on the basis of neural network model. 展开更多
关键词 NEXT Generation Networks NEURAL Network VOIP QoS Circuit SWITCHING PACKET SWITCHING
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部