Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    An Improved BPNN Prediction Method Based on Multi-Strategy Sparrow Search Algorithm

    Xiangyan Tang1,2, Dengfang Feng2,*, KeQiu Li1, Jingxin Liu2, Jinyang Song3, Victor S. Sheng4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2789-2802, 2023, DOI:10.32604/cmc.2023.031304

    Abstract Data prediction can improve the science of decision-making by making predictions about what happens in daily life based on natural law trends. Back propagation (BP) neural network is a widely used prediction method. To reduce its probability of falling into local optimum and improve the prediction accuracy, we propose an improved BP neural network prediction method based on a multi-strategy sparrow search algorithm (MSSA). The weights and thresholds of the BP neural network are optimized using the sparrow search algorithm (SSA). Three strategies are designed to improve the SSA to enhance its optimization-seeking ability, leading to the MSSA-BP prediction model.… More >

  • Open Access

    ARTICLE

    An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time

    Ademola Olusola Adesina1, Patrick Seun Ayobioloja2, Ibidun Christiana Obagbuwa3, Tola John Odule1, Adenrele A. Afolorunso2, Sunday Adeola Ajagbe4,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2661-2675, 2023, DOI:10.32604/cmc.2023.031245

    Abstract CAPTCHA is an acronym that stands for Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA), it is a good example of an authentication system that can be used to determine the true identity of any user. It serves as a security measure to prevent an attack caused by web bots (automatic programs) during an online transaction. It can come as text-based or image-based depending on the project and the programmer. The usability and robustness, as well as level of security, provided each of the varies and call for the development of an improved system. Hence, this… More >

  • Open Access

    ARTICLE

    GA-Stacking: A New Stacking-Based Ensemble Learning Method to Forecast the COVID-19 Outbreak

    Walaa N. Ismail1,2,*, Hessah A. Alsalamah3,4, Ebtesam Mohamed2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3945-3976, 2023, DOI:10.32604/cmc.2023.031194

    Abstract As a result of the increased number of COVID-19 cases, Ensemble Machine Learning (EML) would be an effective tool for combatting this pandemic outbreak. An ensemble of classifiers can improve the performance of single machine learning (ML) classifiers, especially stacking-based ensemble learning. Stacking utilizes heterogeneous-base learners trained in parallel and combines their predictions using a meta-model to determine the final prediction results. However, building an ensemble often causes the model performance to decrease due to the increasing number of learners that are not being properly selected. Therefore, the goal of this paper is to develop and evaluate a generic, data-independent… More >

  • Open Access

    ARTICLE

    Optimizing Optical Attocells Positioning of Indoor Visible Light Communication System

    Mohammed S. M. Gismalla1,2,3, Asrul I. Azmi1,2, Mohd R. Salim1,2, Farabi Iqbal1,2, Mohammad F. L. Abdullah4, Mosab Hamdan5,6, Muzaffar Hamzah5,*, Abu Sahmah M. Supa’at1,2

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3607-3625, 2023, DOI:10.32604/cmc.2023.031192

    Abstract Visible light communication (VLC), which is a prominent emerging solution that complements the radio frequency (RF) technology, exhibits the potential to meet the demands of fifth-generation (5G) and beyond technologies. The random movement of mobile terminals in the indoor environment is a challenge in the VLC system. The model of optical attocells has a critical role in the uniform distribution and the quality of communication links in terms of received power and signal-to-noise ratio (SNR). As such, the optical attocells positions were optimized in this study with a developed try and error (TE) algorithm. The optimized optical attocells were examined… More >

  • Open Access

    ARTICLE

    Optimal Deep Transfer Learning Based Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Maged Mostafa Mahmoud4,5,6, Amer H. Asseri2,7, Hani Choudhry2,7, Haitham A. Yacoub8

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3279-3295, 2023, DOI:10.32604/cmc.2023.031037

    Abstract Colorectal carcinoma (CRC) is one such dispersed cancer globally and also prominent one in causing cancer-based death. Conventionally, pathologists execute CRC diagnosis through visible scrutinizing under the microscope the resected tissue samples, stained and fixed through Haematoxylin and Eosin (H&E). The advancement of graphical processing systems has resulted in high potentiality for deep learning (DL) techniques in interpretating visual anatomy from high resolution medical images. This study develops a slime mould algorithm with deep transfer learning enabled colorectal cancer detection and classification (SMADTL-CCDC) algorithm. The presented SMADTL-CCDC technique intends to appropriately recognize the occurrence of colorectal cancer. To accomplish this,… More >

  • Open Access

    ARTICLE

    An Artificial Approach for the Fractional Order Rape and Its Control Model

    Wajaree Weera1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Salem Ben Said4, Maria Emilia Camargo5, Chantapish Zamart1, Thongchai Botmart1,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3421-3438, 2023, DOI:10.32604/cmc.2023.030996

    Abstract The current investigations provide the solutions of the nonlinear fractional order mathematical rape and its control model using the strength of artificial neural networks (ANNs) along with the Levenberg-Marquardt backpropagation approach (LMBA), i.e., artificial neural networks-Levenberg-Marquardt backpropagation approach (ANNs-LMBA). The fractional order investigations have been presented to find more realistic results of the mathematical form of the rape and its control model. The differential mathematical form of the nonlinear fractional order mathematical rape and its control model has six classes: susceptible native girls, infected immature girls, susceptible knowledgeable girls, infected knowledgeable girls, susceptible rapist population and infective rapist population. The… More >

  • Open Access

    ARTICLE

    Fuzzy-HLSTM (Hierarchical Long Short-Term Memory) for Agricultural Based Information Mining

    Ahmed Abdu Alattab1,*, Mohammed Eid Ibrahim1, Reyazur Rashid Irshad1, Anwar Ali Yahya2, Amin A. Al-Awady3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2397-2413, 2023, DOI:10.32604/cmc.2023.030924

    Abstract This research proposes a machine learning approach using fuzzy logic to build an information retrieval system for the next crop rotation. In case-based reasoning systems, case representation is critical, and thus, researchers have thoroughly investigated textual, attribute-value pair, and ontological representations. As big databases result in slow case retrieval, this research suggests a fast case retrieval strategy based on an associated representation, so that, cases are interrelated in both either similar or dissimilar cases. As soon as a new case is recorded, it is compared to prior data to find a relative match. The proposed method is worked on the… More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double… More >

  • Open Access

    ARTICLE

    Multi Criteria Decision Making for Evaluation and Ranking of Cancer Information

    Shahid Mahmood1,*, Muhammad Amin2, Mubashir Baig Mirza1, Salem Abu-Ghumsan1, Muhammad Akram3, Zahid Mahmood Janjua4, Arslan Shahid5, Usman Shahid6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4469-4481, 2023, DOI:10.32604/cmc.2023.030728

    Abstract Cancer is a disease that is rapidly expanding in prevalence all over the world. Cancer cells can metastasize, or spread, across the body and impact several different cell types. Additionally, the incidence rates of several subtypes of cancer have been on the rise in India. The countermeasures for the cancer disease can be taken by determining the specific expansion rate of each type. To rank the various forms of cancer’s rate of progression, we used some of the available data. Numerous studies are available in the literature which show the growth rate of cancer by different techniques. The accuracy of… More >

  • Open Access

    ARTICLE

    Age and Gender Classification Using Backpropagation and Bagging Algorithms

    Ammar Almomani1,2,*, Mohammed Alweshah3, Waleed Alomoush4, Mohammad Alauthman5, Aseel Jabai2, Anwar Abbass2, Ghufran Hamad2, Meral Abdalla2, Brij B. Gupta1,6,7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3045-3062, 2023, DOI:10.32604/cmc.2023.030567

    Abstract Voice classification is important in creating more intelligent systems that help with student exams, identifying criminals, and security systems. The main aim of the research is to develop a system able to predicate and classify gender, age, and accent. So, a new system called Classifying Voice Gender, Age, and Accent (CVGAA) is proposed. Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories. It has high precision compared to other algorithms used in this problem, as the adaptive… More >

Displaying 1331-1340 on page 134 of 5427. Per Page