Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,722)
  • Open Access

    ARTICLE

    MNN-XSS: Modular Neural Network Based Approach for XSS Attack Detection

    Ahmed Abdullah Alqarni1, Nizar Alsharif1, Nayeem Ahmad Khan1,*, Lilia Georgieva2, Eric Pardade3, Mohammed Y. Alzahrani1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4075-4085, 2022, DOI:10.32604/cmc.2022.020389 - 27 September 2021

    Abstract The rapid growth and uptake of network-based communication technologies have made cybersecurity a significant challenge as the number of cyber-attacks is also increasing. A number of detection systems are used in an attempt to detect known attacks using signatures in network traffic. In recent years, researchers have used different machine learning methods to detect network attacks without relying on those signatures. The methods generally have a high false-positive rate which is not adequate for an industry-ready intrusion detection product. In this study, we propose and implement a new method that relies on a modular deep More >

  • Open Access

    ARTICLE

    Cross Intelligence Evaluation for Effective Emotional Intelligence Estimation

    Ibrahim Alsukayti1, Aman Singh2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2489-2505, 2022, DOI:10.32604/cmc.2022.020264 - 27 September 2021

    Abstract A famous psychologist or researcher, Daniel Goleman, gave a theory on the importance of Emotional Intelligence for the success of an individual’s life. Daniel Goleman quoted in the research that “The contribution of an individual’s Intelligence Quotient (IQ) is only 20% for their success, the remaining 80% is due to Emotional Intelligence (EQ)”. However, in the absence of a reliable technique for EQ evaluation, this factor of overall intelligence is ignored in most of the intelligence evaluation mechanisms. This research presented an analysis based on basic statistical tools along with more sophisticated deep learning tools.… More >

  • Open Access

    ARTICLE

    Deep Rank-Based Average Pooling Network for Covid-19 Recognition

    Shui-Hua Wang1, Muhammad Attique Khan2, Vishnuvarthanan Govindaraj3, Steven L. Fernandes4, Ziquan Zhu5, Yu-Dong Zhang6,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2797-2813, 2022, DOI:10.32604/cmc.2022.020140 - 27 September 2021

    Abstract (Aim) To make a more accurate and precise COVID-19 diagnosis system, this study proposed a novel deep rank-based average pooling network (DRAPNet) model, i.e., deep rank-based average pooling network, for COVID-19 recognition. (Methods) 521 subjects yield 1164 slice images via the slice level selection method. All the 1164 slice images comprise four categories: COVID-19 positive; community-acquired pneumonia; second pulmonary tuberculosis; and healthy control. Our method firstly introduced an improved multiple-way data augmentation. Secondly, an n-conv rank-based average pooling module (NRAPM) was proposed in which rank-based pooling—particularly, rank-based average pooling (RAP)—was employed to avoid overfitting. Third, a… More >

  • Open Access

    ARTICLE

    Optimal Deep Reinforcement Learning for Intrusion Detection in UAVs

    V. Praveena1, A. Vijayaraj2, P. Chinnasamy3, Ihsan Ali4,*, Roobaea Alroobaea5, Saleh Yahya Alyahyan6, Muhammad Ahsan Raza7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2639-2653, 2022, DOI:10.32604/cmc.2022.020066 - 27 September 2021

    Abstract In recent years, progressive developments have been observed in recent technologies and the production cost has been continuously decreasing. In such scenario, Internet of Things (IoT) network which is comprised of a set of Unmanned Aerial Vehicles (UAV), has received more attention from civilian to military applications. But network security poses a serious challenge to UAV networks whereas the intrusion detection system (IDS) is found to be an effective process to secure the UAV networks. Classical IDSs are not adequate to handle the latest computer networks that possess maximum bandwidth and data traffic. In order… More >

  • Open Access

    ARTICLE

    Drug Response Prediction of Liver Cancer Cell Line Using Deep Learning

    Mehdi Hassan1,*, Safdar Ali2, Muhammad Sanaullah3, Khuram Shahzad4, Sadaf Mushtaq5,6, Rashda Abbasi6, Zulqurnain Ali4, Hani Alquhayz7

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2743-2760, 2022, DOI:10.32604/cmc.2022.020055 - 27 September 2021

    Abstract Cancer is the second deadliest human disease worldwide with high mortality rate. Rehabilitation and treatment of this disease requires precise and automatic assessment of effective drug response and control system. Prediction of treated and untreated cancerous cell line is one of the most challenging problems for precise and targeted drug delivery and response. A novel approach is proposed for prediction of drug treated and untreated cancer cell line automatically by employing modified Deep neural networks. Human hepatocellular carcinoma (HepG2) cells are exposed to anticancer drug functionalized CFO@BTO nanoparticles developed by our lab. Prediction models are… More >

  • Open Access

    ARTICLE

    Handling Class Imbalance in Online Transaction Fraud Detection

    Kanika1, Jimmy Singla1, Ali Kashif Bashir2, Yunyoung Nam3,*, Najam UI Hasan4, Usman Tariq5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2861-2877, 2022, DOI:10.32604/cmc.2022.019990 - 27 September 2021

    Abstract With the rise of internet facilities, a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction. However, the fraud cases have also increased causing the loss of money to the consumers. Hence, an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time. Generally, the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem.… More >

  • Open Access

    ARTICLE

    DLBT: Deep Learning-Based Transformer to Generate Pseudo-Code from Source Code

    Walaa Gad1,*, Anas Alokla1, Waleed Nazih2, Mustafa Aref1, Abdel-badeeh Salem1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3117-3132, 2022, DOI:10.32604/cmc.2022.019884 - 27 September 2021

    Abstract Understanding the content of the source code and its regular expression is very difficult when they are written in an unfamiliar language. Pseudo-code explains and describes the content of the code without using syntax or programming language technologies. However, writing Pseudo-code to each code instruction is laborious. Recently, neural machine translation is used to generate textual descriptions for the source code. In this paper, a novel deep learning-based transformer (DLBT) model is proposed for automatic Pseudo-code generation from the source code. The proposed model uses deep learning which is based on Neural Machine Translation (NMT)… More >

  • Open Access

    ARTICLE

    Optimized Tuned Deep Learning Model for Chronic Kidney Disease Classification

    R. H. Aswathy1,*, P. Suresh1, Mohamed Yacin Sikkandar2, S. Abdel-Khalek3, Hesham Alhumyani4, Rashid A. Saeed4, Romany F. Mansour5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2097-2111, 2022, DOI:10.32604/cmc.2022.019790 - 27 September 2021

    Abstract In recent times, Internet of Things (IoT) and Cloud Computing (CC) paradigms are commonly employed in different healthcare applications. IoT gadgets generate huge volumes of patient data in healthcare domain, which can be examined on cloud over the available storage and computation resources in mobile gadgets. Chronic Kidney Disease (CKD) is one of the deadliest diseases that has high mortality rate across the globe. The current research work presents a novel IoT and cloud-based CKD diagnosis model called Flower Pollination Algorithm (FPA)-based Deep Neural Network (DNN) model abbreviated as FPA-DNN. The steps involved in the… More >

  • Open Access

    ARTICLE

    Optimized Convolutional Neural Network Models for Skin Lesion Classification

    Juan Pablo Villa-Pulgarin1, Anderson Alberto Ruales-Torres1,2, Daniel Arias-Garzón1, Mario Alejandro Bravo-Ortiz1, Harold Brayan Arteaga-Arteaga1, Alejandro Mora-Rubio1, Jesus Alejandro Alzate-Grisales1, Esteban Mercado-Ruiz1, M. Hassaballah3, Simon Orozco-Arias4,5, Oscar Cardona-Morales1, Reinel Tabares-Soto1,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2131-2148, 2022, DOI:10.32604/cmc.2022.019529 - 27 September 2021

    Abstract Skin cancer is one of the most severe diseases, and medical imaging is among the main tools for cancer diagnosis. The images provide information on the evolutionary stage, size, and location of tumor lesions. This paper focuses on the classification of skin lesion images considering a framework of four experiments to analyze the classification performance of Convolutional Neural Networks (CNNs) in distinguishing different skin lesions. The CNNs are based on transfer learning, taking advantage of ImageNet weights. Accordingly, in each experiment, different workflow stages are tested, including data augmentation and fine-tuning optimization. Three CNN models More >

  • Open Access

    ARTICLE

    VISPNN: VGG-Inspired Stochastic Pooling Neural Network

    Shui-Hua Wang1, Muhammad Attique Khan2, Yu-Dong Zhang3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.019447 - 27 September 2021

    Abstract Aim Alcoholism is a disease that a patient becomes dependent or addicted to alcohol. This paper aims to design a novel artificial intelligence model that can recognize alcoholism more accurately. Methods We propose the VGG-Inspired stochastic pooling neural network (VISPNN) model based on three components: (i) a VGG-inspired mainstay network, (ii) the stochastic pooling technique, which aims to outperform traditional max pooling and average pooling, and (iii) an improved 20-way data augmentation (Gaussian noise, salt-and-pepper noise, speckle noise, Poisson noise, horizontal shear, vertical shear, rotation, Gamma correction, random translation, and scaling on both raw image and… More >

Displaying 1391-1400 on page 140 of 1722. Per Page