Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,469)
  • Open Access


    Unleashing User Requirements from Social Media Networks by Harnessing the Deep Sentiment Analytics

    Deema Mohammed Alsekait1,*, Asif Nawaz2, Ayman Nabil3, Mehwish Bukhari2, Diaa Salama AbdElminaam3,4,5,6,*

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1031-1054, 2024, DOI:10.32604/csse.2024.051847

    Abstract The article describes a novel method for sentiment analysis and requirement elicitation from social media feedback, leveraging advanced machine learning techniques. This innovative approach automates the extraction and classification of user requirements by analyzing sentiment in data gathered from social media platforms such as Twitter and Facebook. Utilizing APIs (Application Programming Interface) for data collection and Graph-based Neural Networks (GNN) for feature extraction, the proposed model efficiently processes and analyzes large volumes of unstructured user-generated content. The preprocessing pipeline includes data cleaning, normalization, and tokenization, ensuring high-quality input for the sentiment analysis model. By classifying… More >

  • Open Access


    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access


    GliomaCNN: An Effective Lightweight CNN Model in Assessment of Classifying Brain Tumor from Magnetic Resonance Images Using Explainable AI

    Md. Atiqur Rahman1, Mustavi Ibne Masum1, Khan Md Hasib2, M. F. Mridha3,*, Sultan Alfarhood4, Mejdl Safran4,*, Dunren Che5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2425-2448, 2024, DOI:10.32604/cmes.2024.050760

    Abstract Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality. This study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging (MRI). It focuses on distinguishing between Low-Grade Gliomas (LGG) and High-Grade Gliomas (HGG). LGGs are benign and typically manageable with surgical resection, while HGGs are malignant and more aggressive. The research introduces an innovative custom convolutional neural network (CNN) model, Glioma-CNN. GliomaCNN stands out as a lightweight CNN model compared to its predecessors. The research utilized the BraTS 2020 More >

  • Open Access


    A Comprehensive Systematic Review: Advancements in Skin Cancer Classification and Segmentation Using the ISIC Dataset

    Madiha Hameed1,3, Aneela Zameer1,*, Muhammad Asif Zahoor Raja2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2131-2164, 2024, DOI:10.32604/cmes.2024.050124

    Abstract The International Skin Imaging Collaboration (ISIC) datasets are pivotal resources for researchers in machine learning for medical image analysis, especially in skin cancer detection. These datasets contain tens of thousands of dermoscopic photographs, each accompanied by gold-standard lesion diagnosis metadata. Annual challenges associated with ISIC datasets have spurred significant advancements, with research papers reporting metrics surpassing those of human experts. Skin cancers are categorized into melanoma and non-melanoma types, with melanoma posing a greater threat due to its rapid potential for metastasis if left untreated. This paper aims to address challenges in skin cancer detection… More >

  • Open Access


    Advancements in Remote Sensing Image Dehazing: Introducing URA-Net with Multi-Scale Dense Feature Fusion Clusters and Gated Jump Connection

    Hongchi Liu1, Xing Deng1,*, Haijian Shao1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2397-2424, 2024, DOI:10.32604/cmes.2024.049737

    Abstract The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle, profoundly impeding their effective utilization across various domains. Dehazing methodologies have emerged as pivotal components of image preprocessing, fostering an improvement in the quality of remote sensing imagery. This enhancement renders remote sensing data more indispensable, thereby enhancing the accuracy of target identification. Conventional defogging techniques based on simplistic atmospheric degradation models have proven inadequate for mitigating non-uniform haze within remotely sensed images. In response to this challenge, a novel UNet Residual Attention Network (URA-Net) is proposed. This paradigmatic approach… More > Graphic Abstract

    Advancements in Remote Sensing Image Dehazing: Introducing URA-Net with Multi-Scale Dense Feature Fusion Clusters and Gated Jump Connection

  • Open Access


    YOLO-CRD: A Lightweight Model for the Detection of Rice Diseases in Natural Environments

    Rui Zhang1,2, Tonghai Liu1,2,*, Wenzheng Liu1,2, Chaungchuang Yuan1,2, Xiaoyue Seng1,2, Tiantian Guo1,2, Xue Wang1,2

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1275-1296, 2024, DOI:10.32604/phyton.2024.052397

    Abstract Rice diseases can adversely affect both the yield and quality of rice crops, leading to the increased use of pesticides and environmental pollution. Accurate detection of rice diseases in natural environments is crucial for both operational efficiency and quality assurance. Deep learning-based disease identification technologies have shown promise in automatically discerning disease types. However, effectively extracting early disease features in natural environments remains a challenging problem. To address this issue, this study proposes the YOLO-CRD method. This research selected images of common rice diseases, primarily bakanae disease, bacterial brown spot, leaf rice fever, and dry… More >

  • Open Access


    Optimised CNN Architectures for Handwritten Arabic Character Recognition

    Salah Alghyaline*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4905-4924, 2024, DOI:10.32604/cmc.2024.052016

    Abstract Handwritten character recognition is considered challenging compared with machine-printed characters due to the different human writing styles. Arabic is morphologically rich, and its characters have a high similarity. The Arabic language includes 28 characters. Each character has up to four shapes according to its location in the word (at the beginning, middle, end, and isolated). This paper proposed 12 CNN architectures for recognizing handwritten Arabic characters. The proposed architectures were derived from the popular CNN architectures, such as VGG, ResNet, and Inception, to make them applicable to recognizing character-size images. The experimental results on three More >

  • Open Access


    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

  • Open Access


    BDPartNet: Feature Decoupling and Reconstruction Fusion Network for Infrared and Visible Image

    Xuejie Wang1, Jianxun Zhang1,*, Ye Tao2, Xiaoli Yuan1, Yifan Guo1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4621-4639, 2024, DOI:10.32604/cmc.2024.051556

    Abstract While single-modal visible light images or infrared images provide limited information, infrared light captures significant thermal radiation data, whereas visible light excels in presenting detailed texture information. Combining images obtained from both modalities allows for leveraging their respective strengths and mitigating individual limitations, resulting in high-quality images with enhanced contrast and rich texture details. Such capabilities hold promising applications in advanced visual tasks including target detection, instance segmentation, military surveillance, pedestrian detection, among others. This paper introduces a novel approach, a dual-branch decomposition fusion network based on AutoEncoder (AE), which decomposes multi-modal features into intensity… More >

  • Open Access


    A Robust Approach for Multi Classification-Based Intrusion Detection through Stacking Deep Learning Models

    Samia Allaoua Chelloug*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4845-4861, 2024, DOI:10.32604/cmc.2024.051539

    Abstract Intrusion detection is a predominant task that monitors and protects the network infrastructure. Therefore, many datasets have been published and investigated by researchers to analyze and understand the problem of intrusion prediction and detection. In particular, the Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) is an extensively used benchmark dataset for evaluating intrusion detection systems (IDSs) as it incorporates various network traffic attacks. It is worth mentioning that a large number of studies have tackled the problem of intrusion detection using machine learning models, but the performance of these models often decreases when evaluated on… More >

Displaying 1-10 on page 1 of 1469. Per Page