Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (134)
  • Open Access

    ARTICLE

    Integrated CWT-CNN for Epilepsy Detection Using Multiclass EEG Dataset

    Sidra Naseem1, Kashif Javed1, Muhammad Jawad Khan1, Saddaf Rubab2, Muhammad Attique Khan3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 471-486, 2021, DOI:10.32604/cmc.2021.018239

    Abstract Electroencephalography is a common clinical procedure to record brain signals generated by human activity. EEGs are useful in Brain controlled interfaces and other intelligent Neuroscience applications, but manual analysis of these brainwaves is complicated and time-consuming even for the experts of neuroscience. Various EEG analysis and classification techniques have been proposed to address this problem however, the conventional classification methods require identification and learning of specific EEG characteristics beforehand. Deep learning models can learn features from data without having in depth knowledge of data and prior feature identification. One of the great implementations of deep learning is Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    Muhammad Tayyab1,*, Mohsen Marjani1, N. Z. Jhanjhi1, Ibrahim Abaker Targio Hashim2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1183-1200, 2021, DOI:10.32604/cmc.2021.017199

    Abstract Deep learning (DL) algorithms have been widely used in various security applications to enhance the performances of decision-based models. Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models. The two most common active attacks are poisoning and evasion attacks, which can cause various problems, including wrong prediction and misclassification of decision-based models. Therefore, to design an efficient DL model, it is crucial to mitigate these attacks. In this regard, this study proposes a secure neural network (NN) model that provides data security during model training and testing phases. The main… More >

  • Open Access

    ARTICLE

    Suggestion Mining from Opinionated Text of Big Social Media Data

    Youseef Alotaibi1,*, Muhammad Noman Malik2, Huma Hayat Khan3, Anab Batool2, Saif ul Islam4, Abdulmajeed Alsufyani5, Saleh Alghamdi6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3323-3338, 2021, DOI:10.32604/cmc.2021.016727

    Abstract Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and services. The increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making process. To overcome this challenge, extracting suggestions from opinionated text is a possible solution. In this study, the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’ reviews. A classification using a word-embedding approach is used via the XGBoost classifier. The… More >

  • Open Access

    ARTICLE

    Estimating Age in Short Utterances Based on Multi-Class Classification Approach

    Ameer A. Badr1,2,*, Alia K. Abdul-Hassan2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1713-1729, 2021, DOI:10.32604/cmc.2021.016732

    Abstract Age estimation in short speech utterances finds many applications in daily life like human-robot interaction, custom call routing, targeted marketing, user-profiling, etc. Despite the comprehensive studies carried out to extract descriptive features, the estimation errors (i.e. years) are still high. In this study, an automatic system is proposed to estimate age in short speech utterances without depending on the text as well as the speaker. Firstly, four groups of features are extracted from each utterance frame using hybrid techniques and methods. After that, 10 statistical functionals are measured for each extracted feature dimension. Then, the extracted feature dimensions are normalized… More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has two objectives; The first one… More >

  • Open Access

    ARTICLE

    Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset

    Kang-Cheng Chen1, Chia-Mu Yu2,*, Tooska Dargahi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 761-787, 2021, DOI:10.32604/cmc.2021.014984

    Abstract The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to collect fine-grained data about individuals, which enables them to provide more intelligent and customized services. However, although visions thereof promise to make customers’ lives easier, they also raise major security and privacy concerns for their users. Differential privacy (DP) is a common privacy-preserving data publishing technique that is proved to ensure a high level of privacy preservation. However, an important concern arises from the trade-off between the data utility… More >

  • Open Access

    ARTICLE

    Anomaly Detection in ICS Datasets with Machine Learning Algorithms

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Farah Diyana Abdul Rahman, Mohammad Tahir2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 33-46, 2021, DOI:10.32604/csse.2021.014384

    Abstract An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. It supervises the physical process from sensor data and performs remote monitoring control and diagnostic functions in critical infrastructures. The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as… More >

  • Open Access

    ARTICLE

    Statistical Histogram Decision Based Contrast Categorization of Skin Lesion Datasets Dermoscopic Images

    Rabia Javed1,2, Mohd Shafry Mohd Rahim1, Tanzila Saba3, Suliman Mohamed Fati3, Amjad Rehman3,*, Usman Tariq4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2337-2352, 2021, DOI:10.32604/cmc.2021.014677

    Abstract Most of the melanoma cases of skin cancer are the life-threatening form of cancer. It is prevalent among the Caucasian group of people due to their light skin tone. Melanoma is the second most common cancer that hits the age group of 15–29 years. The high number of cases has increased the importance of automated systems for diagnosing. The diagnosis should be fast and accurate for the early treatment of melanoma. It should remove the need for biopsies and provide stable diagnostic results. Automation requires large quantities of images. Skin lesion datasets contain various kinds of dermoscopic images for the… More >

  • Open Access

    ARTICLE

    An Effective Memory Analysis for Malware Detection and Classification

    Rami Sihwail*, Khairuddin Omar, Khairul Akram Zainol Ariffin

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2301-2320, 2021, DOI:10.32604/cmc.2021.014510

    Abstract The study of malware behaviors, over the last years, has received tremendous attention from researchers for the purpose of reducing malware risks. Most of the investigating experiments are performed using either static analysis or behavior analysis. However, recent studies have shown that both analyses are vulnerable to modern malware files that use several techniques to avoid analysis and detection. Therefore, extracted features could be meaningless and a distraction for malware analysts. However, the volatile memory can expose useful information about malware behaviors and characteristics. In addition, memory analysis is capable of detecting unconventional malware, such as in-memory and fileless malware.… More >

  • Open Access

    ARTICLE

    Generation of Synthetic Images of Randomly Stacked Object Scenes for Network Training Applications

    Yajun Zhang1,*, Jianjun Yi1, Jiahao Zhang1, Yuanhao Chen1, Liang He2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 425-439, 2021, DOI:10.32604/iasc.2021.013795

    Abstract Image recognition algorithms based on deep learning have been widely developed in recent years owing to their capability of automatically capturing recognition features from image datasets and constantly improving the accuracy and efficiency of the image recognition process. However, the task of training deep learning networks is time-consuming and expensive because large training datasets are generally required, and extensive manpower is needed to annotate each of the images in the training dataset to support the supervised learning process. This task is particularly arduous when the image scenes involve randomly stacked objects. The present work addresses this issue by developing a… More >

Displaying 111-120 on page 12 of 134. Per Page