Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (872)
  • Open Access


    Force Sensitive Resistors-Based Real-Time Posture Detection System Using Machine Learning Algorithms

    Arsal Javaid1, Areeb Abbas1, Jehangir Arshad1, Mohammad Khalid Imam Rahmani2,*, Sohaib Tahir Chauhdary3, Mujtaba Hussain Jaffery1, Abdulbasid S. Banga2,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1795-1814, 2023, DOI:10.32604/cmc.2023.044140

    Abstract To detect the improper sitting posture of a person sitting on a chair, a posture detection system using machine learning classification has been proposed in this work. The addressed problem correlates to the third Sustainable Development Goal (SDG), ensuring healthy lives and promoting well-being for all ages, as specified by the World Health Organization (WHO). An improper sitting position can be fatal if one sits for a long time in the wrong position, and it can be dangerous for ulcers and lower spine discomfort. This novel study includes a practical implementation of a cushion consisting of a grid of 3… More >

  • Open Access


    Recognition of Human Actions through Speech or Voice Using Machine Learning Techniques

    Oscar Peña-Cáceres1,2,*, Henry Silva-Marchan3, Manuela Albert4, Miriam Gil1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1873-1891, 2023, DOI:10.32604/cmc.2023.043176

    Abstract The development of artificial intelligence (AI) and smart home technologies has driven the need for speech recognition-based solutions. This demand stems from the quest for more intuitive and natural interaction between users and smart devices in their homes. Speech recognition allows users to control devices and perform everyday actions through spoken commands, eliminating the need for physical interfaces or touch screens and enabling specific tasks such as turning on or off the light, heating, or lowering the blinds. The purpose of this study is to develop a speech-based classification model for recognizing human actions in the smart home. It seeks… More >

  • Open Access


    Ensuring User Privacy and Model Security via Machine Unlearning: A Review

    Yonghao Tang1, Zhiping Cai1,*, Qiang Liu1, Tongqing Zhou1, Qiang Ni2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2645-2656, 2023, DOI:10.32604/cmc.2023.032307

    Abstract As an emerging discipline, machine learning has been widely used in artificial intelligence, education, meteorology and other fields. In the training of machine learning models, trainers need to use a large amount of practical data, which inevitably involves user privacy. Besides, by polluting the training data, a malicious adversary can poison the model, thus compromising model security. The data provider hopes that the model trainer can prove to them the confidentiality of the model. Trainer will be required to withdraw data when the trust collapses. In the meantime, trainers hope to forget the injected data to regain security when finding… More >

  • Open Access


    Fake News Detection Using Machine Learning and Deep Learning Methods

    Ammar Saeed1,*, Eesa Al Solami2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2079-2096, 2023, DOI:10.32604/cmc.2023.030551

    Abstract The evolution of the internet and its accessibility in the twenty-first century has resulted in a tremendous increase in the use of social media platforms. Some social media sources contribute to the propagation of fake news that has no real validity, but they accumulate over time and begin to appear in the feed of every consumer producing even more ambiguity. To sustain the value of social media, such stories must be distinguished from the true ones. As a result, an automated system is required to save time and money. The classification of fake news and misinformation from social media data… More >

  • Open Access


    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

  • Open Access


    Detecting Android Botnet Applications Using Convolution Neural Network

    Mamona Arshad1, Ahmad Karim1, Salman Naseer2, Shafiq Ahmad3, Mejdal Alqahtani3, Akber Abid Gardezi4, Muhammad Shafiq5,*, Jin-Ghoo Choi5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2123-2135, 2023, DOI:10.32604/cmc.2022.028680

    Abstract The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e., games applications, entertainment, online banking, social network sites, etc., and also allow the end users to perform a variety of activities. Because of activities, mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information, phishing, spamming, Distributed Denial of Services (DDoS), and malware dissemination. Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area. A… More >

  • Open Access


    Machine Learning Design of Aluminum-Lithium Alloys with High Strength

    Hongxia Wang1,2, Zhiqiang Duan2, Qingwei Guo2, Yongmei Zhang1,2,*, Yuhong Zhao2,3,4,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1393-1409, 2023, DOI:10.32604/cmc.2023.045871

    Abstract Due to the large unexplored compositional space, long development cycle, and high cost of traditional trial-anderror experiments, designing high strength aluminum-lithium alloys is a great challenge. This work establishes a performance-oriented machine learning design strategy for aluminum-lithium alloys to simplify and shorten the development cycle. The calculation results indicate that radial basis function (RBF) neural networks exhibit better predictive ability than back propagation (BP) neural networks. The RBF neural network predicted tensile and yield strengths with determination coefficients of 0.90 and 0.96, root mean square errors of 30.68 and 25.30, and mean absolute errors of 28.15 and 19.08, respectively. In… More >

  • Open Access


    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access in vehicular (VNDN) is another… More >

  • Open Access


    Author’s Age and Gender Prediction on Hotel Review Using Machine Learning Techniques

    Muhammad Hood Khan1, Bilal Khan1,*, Saifullah Jan1, Muhammad Imran Chughtai2

    Journal on Big Data, Vol.5, pp. 41-56, 2023, DOI:10.32604/jbd.2022.044060

    Abstract Author’s Profile (AP) may only be displayed as an article, similar to text collection of material, and must differentiate between gender, age, education, occupation, local language, and relative personality traits. In several information-related fields, including security, forensics, and marketing, and medicine, AP prediction is a significant issue. For instance, it is important to comprehend who wrote the harassing communication. In essence, from a marketing perspective, businesses will get to know one another through examining items and websites on the internet. Accordingly, they will direct their efforts towards a certain gender or age restriction based on the kind of individuals who… More >

  • Open Access


    Robust Machine Learning Technique to Classify COVID-19 Using Fusion of Texture and Vesselness of X-Ray Images

    Shaik Mahaboob Basha1,*, Victor Hugo C. de Albuquerque2, Samia Allaoua Chelloug3,*, Mohamed Abd Elaziz4,5,6,7, Shaik Hashmitha Mohisin8, Suhail Parvaze Pathan9

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1981-2004, 2024, DOI:10.32604/cmes.2023.031425

    Abstract Manual investigation of chest radiography (CXR) images by physicians is crucial for effective decision-making in COVID-19 diagnosis. However, the high demand during the pandemic necessitates auxiliary help through image analysis and machine learning techniques. This study presents a multi-threshold-based segmentation technique to probe high pixel intensity regions in CXR images of various pathologies, including normal cases. Texture information is extracted using gray co-occurrence matrix (GLCM)-based features, while vessel-like features are obtained using Frangi, Sato, and Meijering filters. Machine learning models employing Decision Tree (DT) and Random Forest (RF) approaches are designed to categorize CXR images into common lung infections, lung… More >

Displaying 1-10 on page 1 of 872. Per Page