Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,488)
  • Open Access

    ARTICLE

    A Blockchain Based Framework for Stomach Abnormalities Recognition

    Muhammad Attique Khan1, Inzamam Mashood Nasir1, Muhammad Sharif2, Majed Alhaisoni3, Seifedine Kadry4, Syed Ahmad Chan Bukhari5, Yunyoung Nam6,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 141-158, 2021, DOI:10.32604/cmc.2021.013217

    Abstract Wireless Capsule Endoscopy (WCE) is an imaging technology, widely used in medical imaging for stomach infection recognition. However, a one patient procedure takes almost seven to eight minutes and approximately 57,000 frames are captured. The privacy of patients is very important and manual inspection is time consuming and costly. Therefore, an automated system for recognition of stomach infections from WCE frames is always needed. An existing block chain-based approach is employed in a convolutional neural network model to secure the network for accurate recognition of stomach infections such as ulcer and bleeding. Initially, images are normalized in fixed dimension and… More >

  • Open Access

    REVIEW

    Osteoporosis Prediction for Trabecular Bone using Machine Learning: A Review

    Marrium Anam1, Vasaki a/p Ponnusamy2,*, Muzammil Hussain3, Muhammad Waqas Nadeem2,4, Mazhar Javed3, Hock Guan Goh2, Sadia Qadeer3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 89-105, 2021, DOI:10.32604/cmc.2021.013159

    Abstract Trabecular bone holds the utmost importance due to its significance regarding early bone loss. Diseases like osteoporosis greatly affect the structure of the Trabecular bone which results in different outcomes like high risk of fracture. The objective of this paper is to inspect the characteristics of the Trabecular Bone by using the Magnetic Resonance Imaging (MRI) technique. These characteristics prove to be quite helpful in studying different studies related to Trabecular bone such as osteoporosis. The things that were considered before the selection of the articles for the systematic review were language, research field, and electronic sources. Only those articles… More >

  • Open Access

    ARTICLE

    A New Multi-Agent Feature Wrapper Machine Learning Approach for Heart Disease Diagnosis

    Mohamed Elhoseny1, Mazin Abed Mohammed2,*, Salama A. Mostafa3, Karrar Hameed Abdulkareem4, Mashael S. Maashi5, Begonya Garcia-Zapirain6, Ammar Awad Mutlag7, Marwah Suliman Maashi8

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 51-71, 2021, DOI:10.32604/cmc.2021.012632

    Abstract Heart disease (HD) is a serious widespread life-threatening disease. The heart of patients with HD fails to pump sufficient amounts of blood to the entire body. Diagnosing the occurrence of HD early and efficiently may prevent the manifestation of the debilitating effects of this disease and aid in its effective treatment. Classical methods for diagnosing HD are sometimes unreliable and insufficient in analyzing the related symptoms. As an alternative, noninvasive medical procedures based on machine learning (ML) methods provide reliable HD diagnosis and efficient prediction of HD conditions. However, the existing models of automated ML-based HD diagnostic methods cannot satisfy… More >

  • Open Access

    REVIEW

    A Survey on Machine Learning in Chemical Spectral Analysis

    Dongfang Yu, Jinwei Wang*

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 165-174, 2020, DOI:10.32604/jihpp.2020.010466

    Abstract Chemical spectral analysis is contemporarily undergoing a revolution and drawing much attention of scientists owing to machine learning algorithms, in particular convolutional networks. Hence, this paper outlines the major machine learning and especially deep learning methods contributed to interpret chemical images, and overviews the current application, development and breakthrough in different spectral characterization. Brief categorization of reviewed literatures is provided for studies per application apparatus: X-Ray spectra, UV-Vis-IR spectra, Micro-scope, Raman spectra, Photoluminescence spectrum. End with the overview of existing circumstances in this research area, we provide unique insight and promising directions for the chemical imaging field to fully couple… More >

  • Open Access

    ARTICLE

    Tyre Inspection through Multi-State Convolutional Neural Networks

    C. Sivamani1, M. Rajeswari2, E. Golden Julie3, Y. Harold Robinson4, Vimal Shanmuganathan5, Seifedine Kadry6, Yunyoung Nam7,*

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 1-13, 2021, DOI:10.32604/iasc.2021.013705

    Abstract Road accident is a potential risk to the lives of both drivers and passers-by. Many road accidents occur due to the improper condition of the vehicle tyres after long term usage. Thus, tyres need to be inspected and analyzed while manufacturing to avoid serious road problems. However, tyre wear is a multifaceted happening. It normally needs the non-linearly on many limitations, like tyre formation and plan, vehicle category, conditions of the road. Yet, tyre wear has numerous profitable and environmental inferences particularly due to maintenance costs and traffic safety implications. Thus, the risk to calculate tyre wear is therefore of… More >

  • Open Access

    ARTICLE

    A Novel Semi-Supervised Multi-Label Twin Support Vector Machine

    Qing Ai1,2,*, Yude Kang1, Anna Wang2

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 205-220, 2021, DOI:10.32604/iasc.2021.013357

    Abstract Multi-label learning is a meaningful supervised learning task in which each sample may belong to multiple labels simultaneously. Due to this characteristic, multi-label learning is more complicated and more difficult than multi-class classification learning. The multi-label twin support vector machine (MLTSVM) [], which is an effective multi-label learning algorithm based on the twin support vector machine (TSVM), has been widely studied because of its good classification performance. To obtain good generalization performance, the MLTSVM often needs a large number of labelled samples. In practical engineering problems, it is very time consuming and difficult to obtain all labels of all samples… More >

  • Open Access

    ARTICLE

    Big Data of Home Energy Management in Cloud Computing

    Rizwan Munir1,*, Yifei Wei1, Rahim Ullah2, Iftikhar Hussain3, Kaleem Arshid4, Umair Tariq1

    Journal of Quantum Computing, Vol.2, No.4, pp. 193-202, 2020, DOI:10.32604/jqc.2020.016151

    Abstract A smart grid is the evolved form of the power grid with the integration of sensing, communication, computing, monitoring, and control technologies. These technologies make the power grid reliable, efficient, and economical. However, the smartness boosts the volume of data in the smart grid. To obligate full benefits, big data has attractive techniques to process and analyze smart grid data. This paper presents and simulates a framework to make sure the use of big data computing technique in the smart grid. The offered framework comprises of the following four layers: (i) Data source layer, (ii) Data transmission layer, (iii) Data… More >

  • Open Access

    ARTICLE

    Translation of Quantum Circuits into Quantum Turing Machines for Deutsch and Deutsch-Jozsa Problems

    Giuseppe Corrente*

    Journal of Quantum Computing, Vol.2, No.3, pp. 137-145, 2020, DOI:10.32604/jqc.2020.014586

    Abstract We want in this article to show the usefulness of Quantum Turing Machine (QTM) in a high-level didactic context as well as in theoretical studies. We use QTM to show its equivalence with quantum circuit model for Deutsch and Deutsch-Jozsa algorithms. Further we introduce a strategy of translation from Quantum Circuit to Quantum Turing models by these examples. Moreover we illustrate some features of Quantum Computing such as superposition from a QTM point of view and starting with few simple examples very known in Quantum Circuit form. More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the… More >

  • Open Access

    ARTICLE

    Understanding Research Trends in Android Malware Research Using Information Modelling Techniques

    Jaiteg Singh1, Tanya Gera1, Farman Ali2, Deepak Thakur1, Karamjeet Singh3, Kyung-sup Kwak4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2655-2670, 2021, DOI:10.32604/cmc.2021.014504

    Abstract Android has been dominating the smartphone market for more than a decade and has managed to capture 87.8% of the market share. Such popularity of Android has drawn the attention of cybercriminals and malware developers. The malicious applications can steal sensitive information like contacts, read personal messages, record calls, send messages to premium-rate numbers, cause financial loss, gain access to the gallery and can access the user’s geographic location. Numerous surveys on Android security have primarily focused on types of malware attack, their propagation, and techniques to mitigate them. To the best of our knowledge, Android malware literature has never… More >

Displaying 1201-1210 on page 121 of 1488. Per Page