Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,484)
  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging… More >

  • Open Access

    ARTICLE

    HCSP-Net: A Novel Model of Age-Related Macular Degeneration Classification Based on Color Fundus Photography

    Cheng Wan1, Jiani Zhao1, Xiangqian Hong2, Weihua Yang2,*, Shaochong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 391-407, 2024, DOI:10.32604/cmc.2024.048307

    Abstract Age-related macular degeneration (AMD) ranks third among the most common causes of blindness. As the most conventional and direct method for identifying AMD, color fundus photography has become prominent owing to its consistency, ease of use, and good quality in extensive clinical practice. In this study, a convolutional neural network (CSPDarknet53) was combined with a transformer to construct a new hybrid model, HCSP-Net. This hybrid model was employed to tri-classify color fundus photography into the normal macula (NM), dry macular degeneration (DMD), and wet macular degeneration (WMD) based on clinical classification manifestations, thus identifying and resolving AMD as early as… More >

  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment

    Sapiah Sakri1, Shakila Basheer1, Zuhaira Muhammad Zain1, Nurul Halimatul Asmak Ismail2,*, Dua’ Abdellatef Nassar1, Manal Abdullah Alohali1, Mais Ayman Alharaki1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1157-1185, 2024, DOI:10.32604/cmc.2024.048051

    Abstract Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide. Timely detection is crucial as sepsis can rapidly escalate if left undetected. Recent advancements in deep learning (DL) offer powerful tools to address this challenge. Aim: Thus, this study proposed a hybrid CNNBDLSTM, a combination of a convolutional neural network (CNN) with a bi-directional long short-term memory (BDLSTM) model to predict sepsis onset. Implementing the proposed model provides a robust framework that capitalizes on the complementary strengths of both architectures, resulting in more accurate and timelier predictions. Method: The sepsis prediction method proposed here utilizes… More >

  • Open Access

    ARTICLE

    Intelligent Machine Learning Based Brain Tumor Segmentation through Multi-Layer Hybrid U-Net with CNN Feature Integration

    Sharaf J. Malebary*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1301-1317, 2024, DOI:10.32604/cmc.2024.047917

    Abstract Brain tumors are a pressing public health concern, characterized by their high mortality and morbidity rates. Nevertheless, the manual segmentation of brain tumors remains a laborious and error-prone task, necessitating the development of more precise and efficient methodologies. To address this formidable challenge, we propose an advanced approach for segmenting brain tumor Magnetic Resonance Imaging (MRI) images that harnesses the formidable capabilities of deep learning and convolutional neural networks (CNNs). While CNN-based methods have displayed promise in the realm of brain tumor segmentation, the intricate nature of these tumors, marked by irregular shapes, varying sizes, uneven distribution, and limited available… More >

  • Open Access

    ARTICLE

    Cervical Cancer Prediction Empowered with Federated Machine Learning

    Muhammad Umar Nasir1, Omar Kassem Khalil2, Karamath Ateeq3, Bassam SaleemAllah Almogadwy4, M. A. Khan5, Khan Muhammad Adnan6,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 963-981, 2024, DOI:10.32604/cmc.2024.047874

    Abstract Cervical cancer is an intrusive cancer that imitates various women around the world. Cervical cancer ranks in the fourth position because of the leading death cause in its premature stages. The cervix which is the lower end of the vagina that connects the uterus and vagina forms a cancerous tumor very slowly. This pre-mature cancerous tumor in the cervix is deadly if it cannot be detected in the early stages. So, in this delineated study, the proposed approach uses federated machine learning with numerous machine learning solvers for the prediction of cervical cancer to train the weights with varying neurons… More >

  • Open Access

    ARTICLE

    An Ingenious IoT Based Crop Prediction System Using ML and EL

    Shabana Ramzan1, Yazeed Yasin Ghadi2, Hanan Aljuaid3, Aqsa Mahmood1,*, Basharat Ali4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 183-199, 2024, DOI:10.32604/cmc.2024.047603

    Abstract Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers have no proper knowledge to select which crop is suitable to grow according to the environmental factors and soil characteristics. This is the main reason for the low yield of crops and the economic crisis in the agricultural sector of the different countries. The use of modern technologies such as the Internet of Things (IoT), machine learning, and ensemble learning can facilitate farmers to observe different factors such as soil electrical conductivity (EC), and environmental factors like temperature to improve crop yield. These parameters play a vital… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches

    Jungpil Shin1,*, Md. Al Mehedi Hasan2, Md. Maniruzzaman1, Taiki Watanabe1, Issei Jozume1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1205-1222, 2024, DOI:10.32604/cmc.2024.046954

    Abstract Person identification is one of the most vital tasks for network security. People are more concerned about their security due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprints and faces have been widely used for person identification, which has the risk of information leakage as a result of reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiable pattern, which will not be reproducible falsely by capturing psychological and behavioral information of a person using vision and sensor-based techniques. In existing studies, most of the researchers used very… More >

Displaying 1-10 on page 1 of 1484. Per Page