Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,484)
  • Open Access

    ARTICLE

    Text Classification for Azerbaijani Language Using Machine Learning

    Umid Suleymanov1, Behnam Kiani Kalejahi1,2,*, Elkhan Amrahov1, Rashid Badirkhanli1

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 467-475, 2020, DOI:10.32604/csse.2020.35.467

    Abstract Text classification systems will help to solve the text clustering problem in the Azerbaijani language. There are some text-classification applications for foreign languages, but we tried to build a newly developed system to solve this problem for the Azerbaijani language. Firstly, we tried to find out potential practice areas. The system will be useful in a lot of areas. It will be mostly used in news feed categorization. News websites can automatically categorize news into classes such as sports, business, education, science, etc. The system is also used in sentiment analysis for product reviews. For example, the company shares a… More >

  • Open Access

    ARTICLE

    Prediction and Analysis of Surface Quality of Northeast China Ash Wood during Water-Jet Assisted CO2 Laser Cutting

    Ting Jiang1,3, Chunmei Yang1,2,*, Yueqiang Yu3, Bakary S. Doumbia1,2, Jiuqing Liu1,*, Yan Ma1,2

    Journal of Renewable Materials, Vol.9, No.1, pp. 119-128, 2021, DOI:10.32604/jrm.2021.011490

    Abstract

    As a natural and environmentally friendly renewable material, Northeast China ash wood (NCAW) (Fraxinus mandshurica Rupr.) was cut by water-jet assisted CO2 laser (WACL), the surface quality was evaluated by surface roughness of cut section. The surface roughness was measured by three-dimensional (3D) profilometry. Furthermore, the micromorphology of machined surface was observed by scanning electronic microscopy (SEM). Carbon content changes of machined surface were measured by energy dispersive spectrometer (EDS). A relationship between surface roughness and cutting parameters was established using response surface methodology (RSM). It is concluded that the cutting speed, laser power and water pressure played an important… More >

  • Open Access

    ARTICLE

    A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System

    Amir Haider1, Muhammad Adnan Khan2, Abdur Rehman3, Muhib Ur Rahman4, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1785-1798, 2021, DOI:10.32604/cmc.2020.013910

    Abstract In recent years, cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things (IoT) and the widespread development of computer infrastructure and systems. It is thus becoming particularly necessary to identify cyber-attacks or irregularities in the system and develop an efficient intrusion detection framework that is integral to security. Researchers have worked on developing intrusion detection models that depend on machine learning (ML) methods to address these security problems. An intelligent intrusion detection device powered by data can exploit artificial intelligence (AI), and especially ML, techniques. Accordingly, we propose in this article an intrusion detection… More >

  • Open Access

    ARTICLE

    Fused and Modified Evolutionary Optimization of Multiple Intelligent Systems Using ANN, SVM Approaches

    Jalal Sadoon Hameed Al-bayati1,*, Burak Berk Üstündağ2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1479-1496, 2021, DOI:10.32604/cmc.2020.013329

    Abstract The Fused Modified Grasshopper Optimization Algorithm has been proposed, which selects the most specific feature sets from images of the disease of plant leaves. The Proposed algorithm ensures the detection of diseases during the early stages of the diagnosis of leaf disease by farmers and, finally, the crop needed to be controlled by farmers to ensure the survival and protection of plants. In this study, a novel approach has been suggested based on the standard optimization algorithm for grasshopper and the selection of features. Leaf conditions in plants are a major factor in reducing crop yield and quality. Any delay… More >

  • Open Access

    ARTICLE

    Autonomous Parking-Lots Detection with Multi-Sensor Data Fusion Using Machine Deep Learning Techniques

    Kashif Iqbal1,2, Sagheer Abbas1, Muhammad Adnan Khan3,*, Atifa Athar4, Muhammad Saleem Khan1, Areej Fatima3, Gulzar Ahmad1

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1595-1612, 2021, DOI:10.32604/cmc.2020.013231

    Abstract The rapid development and progress in deep machine-learning techniques have become a key factor in solving the future challenges of humanity. Vision-based target detection and object classification have been improved due to the development of deep learning algorithms. Data fusion in autonomous driving is a fact and a prerequisite task of data preprocessing from multi-sensors that provide a precise, well-engineered, and complete detection of objects, scene or events. The target of the current study is to develop an in-vehicle information system to prevent or at least mitigate traffic issues related to parking detection and traffic congestion detection. In this study… More >

  • Open Access

    ARTICLE

    Improving the Detection Rate of Rarely Appearing Intrusions in Network-Based Intrusion Detection Systems

    Eunmok Yang1, Gyanendra Prasad Joshi2, Changho Seo3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1647-1663, 2021, DOI:10.32604/cmc.2020.013210

    Abstract In network-based intrusion detection practices, there are more regular instances than intrusion instances. Because there is always a statistical imbalance in the instances, it is difficult to train the intrusion detection system effectively. In this work, we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances. Our technique mitigates the statistical imbalance in these instances. We also carried out an experiment on the training model by increasing the instances, thereby increasing the attack instances step by step up to 13 levels. The experiments included not only known attacks, but also… More >

  • Open Access

    ARTICLE

    A Novel Approach to Data Encryption Based on Matrix Computations

    Rosilah Hassan1, Selver Pepic2, Muzafer Saracevic3, Khaleel Ahmad4,*, Milan Tasic5

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1139-1153, 2021, DOI:10.32604/cmc.2020.013104

    Abstract In this paper, we provide a new approach to data encryption using generalized inverses. Encryption is based on the implementation of weighted Moore–Penrose inverse AMN(nxm) over the nx8 constant matrix. The square Hermitian positive definite matrix N8x8 p is the key. The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge. We have provided NIST (National Institute of Standards and Technology) quality assurance tests for a random generated Hermitian matrix (a total of 10 different tests and additional analysis with approximate entropy and random digression). In the… More >

  • Open Access

    ARTICLE

    Early Detection of Diabetic Retinopathy Using Machine Intelligence through Deep Transfer and Representational Learning

    Fouzia Nawaz1, Muhammad Ramzan1, Khalid Mehmood1, Hikmat Ullah Khan2, Saleem Hayat Khan3,4, Muhammad Raheel Bhutta5,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1631-1645, 2021, DOI:10.32604/cmc.2020.012887

    Abstract Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness. DR occurs due to the high blood sugar level of the patient, and it is clumsy to be detected at an early stage as no early symptoms appear at the initial level. To prevent blindness, early detection and regular treatment are needed. Automated detection based on machine intelligence may assist the ophthalmologist in examining the patients’ condition more accurately and efficiently. The purpose of this study is to produce an automated screening system for recognition and grading of diabetic retinopathy using machine learning through deep transfer and representational learning.… More >

  • Open Access

    ARTICLE

    Marker-Based and Marker-Less Motion Capturing Video Data: Person and Activity Identification Comparison Based on Machine Learning Approaches

    Syeda Binish Zahra1,2, Muhammad Adnan Khan2,*, Sagheer Abbas1, Khalid Masood Khan2, Mohammed A. Al-Ghamdi3, Sultan H. Almotiri3

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1269-1282, 2021, DOI:10.32604/cmc.2020.012778

    Abstract Biomechanics is the study of physiological properties of data and the measurement of human behavior. In normal conditions, behavioural properties in stable form are created using various inputs of subconscious/conscious human activities such as speech style, body movements in walking patterns, writing style and voice tunes. One cannot perform any change in these inputs that make results reliable and increase the accuracy. The aim of our study is to perform a comparative analysis between the marker-based motion capturing system (MBMCS) and the marker-less motion capturing system (MLMCS) using the lower body joint angles of human gait patterns. In both the… More >

  • Open Access

    ARTICLE

    Understanding the Language of ISIS: An Empirical Approach to Detect Radical Content on Twitter Using Machine Learning

    Zia Ul Rehman1,2, Sagheer Abbas1, Muhammad Adnan Khan3,*, Ghulam Mustafa2, Hira Fayyaz4, Muhammad Hanif1,2, Muhammad Anwar Saeed5

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1075-1090, 2021, DOI:10.32604/cmc.2020.012770

    Abstract The internet, particularly online social networking platforms have revolutionized the way extremist groups are influencing and radicalizing individuals. Recent research reveals that the process initiates by exposing vast audiences to extremist content and then migrating potential victims to confined platforms for intensive radicalization. Consequently, social networks have evolved as a persuasive tool for extremism aiding as recruitment platform and psychological warfare. Thus, recognizing potential radical text or material is vital to restrict the circulation of the extremist chronicle. The aim of this research work is to identify radical text in social media. Our contributions are as follows: (i) A new… More >

Displaying 1221-1230 on page 123 of 1484. Per Page