Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,427)
  • Open Access

    ARTICLE

    Parkinson's Detection Using RNN-Graph-LSTM with Optimization Based on Speech Signals

    Ahmed S. Almasoud1, Taiseer Abdalla Elfadil Eisa2, Fahd N. Al-Wesabi3,4, Abubakar Elsafi5, Mesfer Al Duhayyim6, Ishfaq Yaseen7, Manar Ahmed Hamza7,*, Abdelwahed Motwakel7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 871-886, 2022, DOI:10.32604/cmc.2022.024596

    Abstract Early detection of Parkinson's Disease (PD) using the PD patients’ voice changes would avoid the intervention before the identification of physical symptoms. Various machine learning algorithms were developed to detect PD detection. Nevertheless, these ML methods are lack in generalization and reduced classification performance due to subject overlap. To overcome these issues, this proposed work apply graph long short term memory (GLSTM) model to classify the dynamic features of the PD patient speech signal. The proposed classification model has been further improved by implementing the recurrent neural network (RNN) in batch normalization layer of GLSTM and optimized with adaptive moment… More >

  • Open Access

    ARTICLE

    A Lightweight CNN Based on Transfer Learning for COVID-19 Diagnosis

    Xiaorui Zhang1,2,3,*, Jie Zhou2, Wei Sun3,4, Sunil Kumar Jha5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1123-1137, 2022, DOI:10.32604/cmc.2022.024589

    Abstract The key to preventing the COVID-19 is to diagnose patients quickly and accurately. Studies have shown that using Convolutional Neural Networks (CNN) to analyze chest Computed Tomography (CT) images is helpful for timely COVID-19 diagnosis. However, personal privacy issues, public chest CT data sets are relatively few, which has limited CNN's application to COVID-19 diagnosis. Also, many CNNs have complex structures and massive parameters. Even if equipped with the dedicated Graphics Processing Unit (GPU) for acceleration, it still takes a long time, which is not conductive to widespread application. To solve above problems, this paper proposes a lightweight CNN classification… More >

  • Open Access

    ARTICLE

    Locomotion of Bioinspired Underwater Snake Robots Using Metaheuristic Algorithm

    Souad Larabi-Marie-Sainte1, Taiseer Abdalla Elfadil Eisa2, Fahd N. Al-Wesabi3,4, Amani Abdulrahman Albraikan5, Manar Ahmed Hamza6,*, Abdelwahed Motwakel6, Ishfaq Yaseen6, Mesfer Al Duhayyim7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1293-1308, 2022, DOI:10.32604/cmc.2022.024585

    Abstract Snake Robots (SR) have been successfully deployed and proved to attain bio-inspired solutions owing to its capability to move in harsh environments, a characteristic not found in other kinds of robots (like wheeled or legged robots). Underwater Snake Robots (USR) establish a bioinspired solution in the domain of underwater robotics. It is a key challenge to increase the motion efficiency in underwater robots, with respect to forwarding speed, by enhancing the locomotion method. At the same time, energy efficiency is also considered as a crucial issue for long-term automation of the systems. In this aspect, the current research paper concentrates… More >

  • Open Access

    ARTICLE

    Short-Term Wind Energy Forecasting Using Deep Learning-Based Predictive Analytics

    Noman Shabbir1, Lauri Kütt1, Muhammad Jawad2, Oleksandr Husev1, Ateeq Ur Rehman3, Akber Abid Gardezi4, Muhammad Shafiq5, Jin-Ghoo Choi5,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1017-1033, 2022, DOI:10.32604/cmc.2022.024576

    Abstract Wind energy is featured by instability due to a number of factors, such as weather, season, time of the day, climatic area and so on. Furthermore, instability in the generation of wind energy brings new challenges to electric power grids, such as reliability, flexibility, and power quality. This transition requires a plethora of advanced techniques for accurate forecasting of wind energy. In this context, wind energy forecasting is closely tied to machine learning (ML) and deep learning (DL) as emerging technologies to create an intelligent energy management paradigm. This article attempts to address the short-term wind energy forecasting problem in… More >

  • Open Access

    ARTICLE

    A Skeleton-based Approach for Campus Violence Detection

    Batyrkhan Omarov1,2,3,4,*, Sergazy Narynov1, Zhandos Zhumanov1,2, Aidana Gumar1,5, Mariyam Khassanova1,5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 315-331, 2022, DOI:10.32604/cmc.2022.024566

    Abstract In this paper, we propose a skeleton-based method to identify violence and aggressive behavior. The approach does not necessitate high-processing equipment and it can be quickly implemented. Our approach consists of two phases: feature extraction from image sequences to assess a human posture, followed by activity classification applying a neural network to identify whether the frames include aggressive situations and violence. A video violence dataset of 400 min comprising a single person's activities and 20 h of video data including physical violence and aggressive acts, and 13 classifications for distinguishing aggressor and victim behavior were generated. Finally, the proposed method… More >

  • Open Access

    ARTICLE

    High Performance Classification of Android Malware Using Ensemble Machine Learning

    Pagnchakneat C. Ouk1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 381-398, 2022, DOI:10.32604/cmc.2022.024540

    Abstract Although Android becomes a leading operating system in market, Android users suffer from security threats due to malwares. To protect users from the threats, the solutions to detect and identify the malware variant are essential. However, modern malware evades existing solutions by applying code obfuscation and native code. To resolve this problem, we introduce an ensemble-based malware classification algorithm using malware family grouping. The proposed family grouping algorithm finds the optimal combination of families belonging to the same group while the total number of families is fixed to the optimal total number. It also adopts unified feature extraction technique for… More >

  • Open Access

    ARTICLE

    An Evolutionary Normalization Algorithm for Signed Floating-Point Multiply-Accumulate Operation

    Rajkumar Sarma1, Cherry Bhargava2, Ketan Kotecha3,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 481-495, 2022, DOI:10.32604/cmc.2022.024516

    Abstract In the era of digital signal processing, like graphics and computation systems, multiplication-accumulation is one of the prime operations. A MAC unit is a vital component of a digital system, like different Fast Fourier Transform (FFT) algorithms, convolution, image processing algorithms, etcetera. In the domain of digital signal processing, the use of normalization architecture is very vast. The main objective of using normalization is to perform comparison and shift operations. In this research paper, an evolutionary approach for designing an optimized normalization algorithm is proposed using basic logical blocks such as Multiplexer, Adder etc. The proposed normalization algorithm is further… More >

  • Open Access

    ARTICLE

    Efficient Approach for Resource Allocation in WPCN Using Hybrid Optimization

    Richu Mary Thomas, Malarvizhi Subramani*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1275-1291, 2022, DOI:10.32604/cmc.2022.024507

    Abstract The recent aggrandizement of radio frequency (RF) signals in wireless power transmission combined with energy harvesting methods have led to the replacement of traditional battery-powered wireless networks since the blooming RF technology provides energy renewal of wireless devices with the quality of service (QoS). In addition, it does not require any unnecessary alterations on the transmission hardware side. A hybridized global optimization technique uniting Global best and Local best (GL) based particle swarm optimization (PSO) and ant colony optimization (ACO) is proposed in this paper to optimally allocate resources in wireless powered communication networks (WPCN) through coordinated operation of communication… More >

  • Open Access

    ARTICLE

    Malware Detection Using Decision Tree Based SVM Classifier for IoT

    Anwer Mustafa Hilal1,*, Siwar Ben Haj Hassine2, Souad Larabi-Marie-Sainte3, Nadhem Nemri2, Mohamed K. Nour4, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mesfer Al Duhayyim5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 713-726, 2022, DOI:10.32604/cmc.2022.024501

    Abstract The development in Information and Communication Technology has led to the evolution of new computing and communication environment. Technological revolution with Internet of Things (IoTs) has developed various applications in almost all domains from health care, education to entertainment with sensors and smart devices. One of the subsets of IoT is Internet of Medical things (IoMT) which connects medical devices, hardware and software applications through internet. IoMT enables secure wireless communication over the Internet to allow efficient analysis of medical data. With these smart advancements and exploitation of smart IoT devices in health care technology there increases threat and malware… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Internet of Things Cyberattacks

    Manal Alanazi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 261-279, 2022, DOI:10.32604/cmc.2022.024496

    Abstract The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives. The IoT revolution has redefined digital services in different domains by improving efficiency, productivity, and cost-effectiveness. Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’ operation; however, IoT security issues remain a significant challenge. To minimize the risk of cyberattacks on IoT networks, anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks. Although various detection techniques… More >

Displaying 2181-2190 on page 219 of 5427. Per Page