Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,152)
  • Open Access

    ARTICLE

    Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AI

    Sannasi Chakravarthy1, Bharanidharan Nagarajan2, Surbhi Bhatia Khan3,7,*, Vinoth Kumar Venkatesan2, Mahesh Thyluru Ramakrishna4, Ahlam Al Musharraf5, Khursheed Aurungzeb6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 5029-5045, 2024, DOI:10.32604/cmc.2024.052531 - 12 September 2024

    Abstract Breast cancer is a type of cancer responsible for higher mortality rates among women. The cruelty of breast cancer always requires a promising approach for its earlier detection. In light of this, the proposed research leverages the representation ability of pretrained EfficientNet-B0 model and the classification ability of the XGBoost model for the binary classification of breast tumors. In addition, the above transfer learning model is modified in such a way that it will focus more on tumor cells in the input mammogram. Accordingly, the work proposed an EfficientNet-B0 having a Spatial Attention Layer with More >

  • Open Access

    ARTICLE

    A Hierarchical Two-Level Feature Fusion Approach for SMS Spam Filtering

    Hussein Alaa Al-Kabbi1,2, Mohammad-Reza Feizi-Derakhshi1,*, Saeed Pashazadeh3

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 665-682, 2024, DOI:10.32604/iasc.2024.050452 - 06 September 2024

    Abstract SMS spam poses a significant challenge to maintaining user privacy and security. Recently, spammers have employed fraudulent writing styles to bypass spam detection systems. This paper introduces a novel two-level detection system that utilizes deep learning techniques for effective spam identification to address the challenge of sophisticated SMS spam. The system comprises five steps, beginning with the preprocessing of SMS data. RoBERTa word embedding is then applied to convert text into a numerical format for deep learning analysis. Feature extraction is performed using a Convolutional Neural Network (CNN) for word-level analysis and a Bidirectional Long… More >

  • Open Access

    ARTICLE

    Importance-Weighted Transfer Learning for Fault Classification under Covariate Shift

    Yi Pan1, Lei Xie2,*, Hongye Su2

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 683-696, 2024, DOI:10.32604/iasc.2023.038543 - 06 September 2024

    Abstract In the process of fault detection and classification, the operation mode usually drifts over time, which brings great challenges to the algorithms. Because traditional machine learning based fault classification cannot dynamically update the trained model according to the probability distribution of the testing dataset, the accuracy of these traditional methods usually drops significantly in the case of covariate shift. In this paper, an importance-weighted transfer learning method is proposed for fault classification in the nonlinear multi-mode industrial process. It effectively alters the drift between the training and testing dataset. Firstly, the mutual information method is… More >

  • Open Access

    ARTICLE

    Ensemble Modeling for the Classification of Birth Data

    Fiaz Majeed1, Abdul Razzaq Ahmad Shakir1, Maqbool Ahmad2, Shahzada Khurram3, Muhammad Qaiser Saleem4, Muhammad Shafiq5,*, Jin-Ghoo Choi5, Habib Hamam6,7,8,9,10, Osama E. Sheta11

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 765-781, 2024, DOI:10.32604/iasc.2023.034029 - 06 September 2024

    Abstract Machine learning (ML) and data mining are used in various fields such as data analysis, prediction, image processing and especially in healthcare. Researchers in the past decade have focused on applying ML and data mining to generate conclusions from historical data in order to improve healthcare systems by making predictions about the results. Using ML algorithms, researchers have developed applications for decision support, analyzed clinical aspects, extracted informative information from historical data, predicted the outcomes and categorized diseases which help physicians make better decisions. It is observed that there is a huge difference between women… More >

  • Open Access

    REVIEW

    Unlocking the Potential: A Comprehensive Systematic Review of ChatGPT in Natural Language Processing Tasks

    Ebtesam Ahmad Alomari*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 43-85, 2024, DOI:10.32604/cmes.2024.052256 - 20 August 2024

    Abstract As Natural Language Processing (NLP) continues to advance, driven by the emergence of sophisticated large language models such as ChatGPT, there has been a notable growth in research activity. This rapid uptake reflects increasing interest in the field and induces critical inquiries into ChatGPT’s applicability in the NLP domain. This review paper systematically investigates the role of ChatGPT in diverse NLP tasks, including information extraction, Name Entity Recognition (NER), event extraction, relation extraction, Part of Speech (PoS) tagging, text classification, sentiment analysis, emotion recognition and text annotation. The novelty of this work lies in its… More >

  • Open Access

    ARTICLE

    Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images

    Sonali Das1, Saroja Kumar Rout2, Sujit Kumar Panda1, Pradyumna Kumar Mohapatra3, Abdulaziz S. Almazyad4, Muhammed Basheer Jasser5,6,*, Guojiang Xiong7, Ali Wagdy Mohamed8,9

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 893-916, 2024, DOI:10.32604/cmes.2024.051856 - 20 August 2024

    Abstract In blood or bone marrow, leukemia is a form of cancer. A person with leukemia has an expansion of white blood cells (WBCs). It primarily affects children and rarely affects adults. Treatment depends on the type of leukemia and the extent to which cancer has established throughout the body. Identifying leukemia in the initial stage is vital to providing timely patient care. Medical image-analysis-related approaches grant safer, quicker, and less costly solutions while ignoring the difficulties of these invasive processes. It can be simple to generalize Computer vision (CV)-based and image-processing techniques and eradicate human… More >

  • Open Access

    ARTICLE

    Explainable Artificial Intelligence (XAI) Model for Cancer Image Classification

    Amit Singhal1, Krishna Kant Agrawal2, Angeles Quezada3, Adrian Rodriguez Aguiñaga4, Samantha Jiménez4, Satya Prakash Yadav5,,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 401-441, 2024, DOI:10.32604/cmes.2024.051363 - 20 August 2024

    Abstract The use of Explainable Artificial Intelligence (XAI) models becomes increasingly important for making decisions in smart healthcare environments. It is to make sure that decisions are based on trustworthy algorithms and that healthcare workers understand the decisions made by these algorithms. These models can potentially enhance interpretability and explainability in decision-making processes that rely on artificial intelligence. Nevertheless, the intricate nature of the healthcare field necessitates the utilization of sophisticated models to classify cancer images. This research presents an advanced investigation of XAI models to classify cancer images. It describes the different levels of explainability… More >

  • Open Access

    ARTICLE

    An Attention-Based Approach to Enhance the Detection and Classification of Android Malware

    Abdallah Ghourabi*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2743-2760, 2024, DOI:10.32604/cmc.2024.053163 - 15 August 2024

    Abstract The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in malware. These malicious applications have become a serious concern to the security of Android systems. To address this problem, researchers have proposed several machine-learning models to detect and classify Android malware based on analyzing features extracted from Android samples. However, most existing studies have focused on the classification task and overlooked the feature selection process, which is crucial to reduce the training time and maintain or improve the classification results. The… More >

  • Open Access

    ARTICLE

    Dynamic Multi-Layer Perceptron for Fetal Health Classification Using Cardiotocography Data

    Uddagiri Sirisha1,, Parvathaneni Naga Srinivasu2,3,*, Panguluri Padmavathi4, Seongki Kim5,, Aruna Pavate6, Jana Shafi7, Muhammad Fazal Ijaz8,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2301-2330, 2024, DOI:10.32604/cmc.2024.053132 - 15 August 2024

    Abstract Fetal health care is vital in ensuring the health of pregnant women and the fetus. Regular check-ups need to be taken by the mother to determine the status of the fetus’ growth and identify any potential problems. To know the status of the fetus, doctors monitor blood reports, Ultrasounds, cardiotocography (CTG) data, etc. Still, in this research, we have considered CTG data, which provides information on heart rate and uterine contractions during pregnancy. Several researchers have proposed various methods for classifying the status of fetus growth. Manual processing of CTG data is time-consuming and unreliable.… More >

  • Open Access

    ARTICLE

    An Optimized Approach to Deep Learning for Botnet Detection and Classification for Cybersecurity in Internet of Things Environment

    Abdulrahman Alzahrani*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2331-2349, 2024, DOI:10.32604/cmc.2024.052804 - 15 August 2024

    Abstract The recent development of the Internet of Things (IoTs) resulted in the growth of IoT-based DDoS attacks. The detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected devices. Anomaly detection models evaluate transmission patterns, network traffic, and device behaviour to detect deviations from usual activities. Machine learning (ML) techniques detect patterns signalling botnet activity, namely sudden traffic increase, unusual command and control patterns, or irregular device behaviour. In addition, intrusion detection systems (IDSs) and signature-based techniques are applied to recognize known malware signatures related to botnets.… More >

Displaying 31-40 on page 4 of 1152. Per Page