Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,124)
  • Open Access

    ARTICLE

    Prediction of COVID-19 Cases Using Machine Learning for Effective Public Health Management

    Fahad Ahmad1,*, Saleh N. Almuayqil2, Mamoona Humayun2, Shahid Naseem3, Wasim Ahmad Khan4, Kashaf Junaid5

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2265-2282, 2021, DOI:10.32604/cmc.2021.013067 - 28 December 2020

    Abstract COVID-19 is a pandemic that has affected nearly every country in the world. At present, sustainable development in the area of public health is considered vital to securing a promising and prosperous future for humans. However, widespread diseases, such as COVID-19, create numerous challenges to this goal, and some of those challenges are not yet defined. In this study, a Shallow Single-Layer Perceptron Neural Network (SSLPNN) and Gaussian Process Regression (GPR) model were used for the classification and prediction of confirmed COVID-19 cases in five geographically distributed regions of Asia with diverse settings and environmental… More >

  • Open Access

    ARTICLE

    A Comprehensive Investigation of Machine Learning Feature Extraction and Classification Methods for Automated Diagnosis of COVID-19 Based on X-ray Images

    Mazin Abed Mohammed1, Karrar Hameed Abdulkareem2, Begonya Garcia-Zapirain3, Salama A. Mostafa4, Mashael S. Maashi5, Alaa S. Al-Waisy1, Mohammed Ahmed Subhi6, Ammar Awad Mutlag7, Dac-Nhuong Le8,9,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3289-3310, 2021, DOI:10.32604/cmc.2021.012874 - 28 December 2020

    Abstract The quick spread of the Coronavirus Disease (COVID-19) infection around the world considered a real danger for global health. The biological structure and symptoms of COVID-19 are similar to other viral chest maladies, which makes it challenging and a big issue to improve approaches for efficient identification of COVID-19 disease. In this study, an automatic prediction of COVID-19 identification is proposed to automatically discriminate between healthy and COVID-19 infected subjects in X-ray images using two successful moderns are traditional machine learning methods (e.g., artificial neural network (ANN), support vector machine (SVM), linear kernel and radial… More >

  • Open Access

    ARTICLE

    Recognition and Classification of Pomegranate Leaves Diseases by Image Processing and Machine Learning Techniques

    Mangena Venu Madhavan1, Dang Ngoc Hoang Thanh2, Aditya Khamparia1,*, Sagar Pande1, Rahul Malik1, Deepak Gupta3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2939-2955, 2021, DOI:10.32604/cmc.2021.012466 - 28 December 2020

    Abstract Disease recognition in plants is one of the essential problems in agricultural image processing. This article focuses on designing a framework that can recognize and classify diseases on pomegranate plants exactly. The framework utilizes image processing techniques such as image acquisition, image resizing, image enhancement, image segmentation, ROI extraction (region of interest), and feature extraction. An image dataset related to pomegranate leaf disease is utilized to implement the framework, divided into a training set and a test set. In the implementation process, techniques such as image enhancement and image segmentation are primarily used for identifying More >

  • Open Access

    ARTICLE

    A Real-Time Sequential Deep Extreme Learning Machine Cybersecurity Intrusion Detection System

    Amir Haider1, Muhammad Adnan Khan2, Abdur Rehman3, Muhib Ur Rahman4, Hyung Seok Kim1,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1785-1798, 2021, DOI:10.32604/cmc.2020.013910 - 26 November 2020

    Abstract In recent years, cybersecurity has attracted significant interest due to the rapid growth of the Internet of Things (IoT) and the widespread development of computer infrastructure and systems. It is thus becoming particularly necessary to identify cyber-attacks or irregularities in the system and develop an efficient intrusion detection framework that is integral to security. Researchers have worked on developing intrusion detection models that depend on machine learning (ML) methods to address these security problems. An intelligent intrusion detection device powered by data can exploit artificial intelligence (AI), and especially ML, techniques. Accordingly, we propose in More >

  • Open Access

    ARTICLE

    Fused and Modified Evolutionary Optimization of Multiple Intelligent Systems Using ANN, SVM Approaches

    Jalal Sadoon Hameed Al-bayati1,*, Burak Berk Üstündağ2

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1479-1496, 2021, DOI:10.32604/cmc.2020.013329 - 26 November 2020

    Abstract The Fused Modified Grasshopper Optimization Algorithm has been proposed, which selects the most specific feature sets from images of the disease of plant leaves. The Proposed algorithm ensures the detection of diseases during the early stages of the diagnosis of leaf disease by farmers and, finally, the crop needed to be controlled by farmers to ensure the survival and protection of plants. In this study, a novel approach has been suggested based on the standard optimization algorithm for grasshopper and the selection of features. Leaf conditions in plants are a major factor in reducing crop… More >

  • Open Access

    ARTICLE

    Improving the Detection Rate of Rarely Appearing Intrusions in Network-Based Intrusion Detection Systems

    Eunmok Yang1, Gyanendra Prasad Joshi2, Changho Seo3,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1647-1663, 2021, DOI:10.32604/cmc.2020.013210 - 26 November 2020

    Abstract In network-based intrusion detection practices, there are more regular instances than intrusion instances. Because there is always a statistical imbalance in the instances, it is difficult to train the intrusion detection system effectively. In this work, we compare intrusion detection performance by increasing the rarely appearing instances rather than by eliminating the frequently appearing duplicate instances. Our technique mitigates the statistical imbalance in these instances. We also carried out an experiment on the training model by increasing the instances, thereby increasing the attack instances step by step up to 13 levels. The experiments included not… More >

  • Open Access

    ARTICLE

    A Novel Approach to Data Encryption Based on Matrix Computations

    Rosilah Hassan1, Selver Pepic2, Muzafer Saracevic3, Khaleel Ahmad4,*, Milan Tasic5

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1139-1153, 2021, DOI:10.32604/cmc.2020.013104 - 26 November 2020

    Abstract In this paper, we provide a new approach to data encryption using generalized inverses. Encryption is based on the implementation of weighted Moore–Penrose inverse AMN(nxm) over the nx8 constant matrix. The square Hermitian positive definite matrix N8x8 p is the key. The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge. We have provided NIST (National Institute of Standards and Technology) quality assurance tests for a random generated Hermitian matrix (a total of 10 different tests and additional analysis with approximate entropy and random… More >

  • Open Access

    ARTICLE

    Early Detection of Diabetic Retinopathy Using Machine Intelligence through Deep Transfer and Representational Learning

    Fouzia Nawaz1, Muhammad Ramzan1, Khalid Mehmood1, Hikmat Ullah Khan2, Saleem Hayat Khan3,4, Muhammad Raheel Bhutta5,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1631-1645, 2021, DOI:10.32604/cmc.2020.012887 - 26 November 2020

    Abstract Diabetic retinopathy (DR) is a retinal disease that causes irreversible blindness. DR occurs due to the high blood sugar level of the patient, and it is clumsy to be detected at an early stage as no early symptoms appear at the initial level. To prevent blindness, early detection and regular treatment are needed. Automated detection based on machine intelligence may assist the ophthalmologist in examining the patients’ condition more accurately and efficiently. The purpose of this study is to produce an automated screening system for recognition and grading of diabetic retinopathy using machine learning through More >

  • Open Access

    ARTICLE

    Marker-Based and Marker-Less Motion Capturing Video Data: Person and Activity Identification Comparison Based on Machine Learning Approaches

    Syeda Binish Zahra1,2, Muhammad Adnan Khan2,*, Sagheer Abbas1, Khalid Masood Khan2, Mohammed A. Al-Ghamdi3, Sultan H. Almotiri3

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1269-1282, 2021, DOI:10.32604/cmc.2020.012778 - 26 November 2020

    Abstract Biomechanics is the study of physiological properties of data and the measurement of human behavior. In normal conditions, behavioural properties in stable form are created using various inputs of subconscious/conscious human activities such as speech style, body movements in walking patterns, writing style and voice tunes. One cannot perform any change in these inputs that make results reliable and increase the accuracy. The aim of our study is to perform a comparative analysis between the marker-based motion capturing system (MBMCS) and the marker-less motion capturing system (MLMCS) using the lower body joint angles of human… More >

  • Open Access

    ARTICLE

    Understanding the Language of ISIS: An Empirical Approach to Detect Radical Content on Twitter Using Machine Learning

    Zia Ul Rehman1,2, Sagheer Abbas1, Muhammad Adnan Khan3,*, Ghulam Mustafa2, Hira Fayyaz4, Muhammad Hanif1,2, Muhammad Anwar Saeed5

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1075-1090, 2021, DOI:10.32604/cmc.2020.012770 - 26 November 2020

    Abstract The internet, particularly online social networking platforms have revolutionized the way extremist groups are influencing and radicalizing individuals. Recent research reveals that the process initiates by exposing vast audiences to extremist content and then migrating potential victims to confined platforms for intensive radicalization. Consequently, social networks have evolved as a persuasive tool for extremism aiding as recruitment platform and psychological warfare. Thus, recognizing potential radical text or material is vital to restrict the circulation of the extremist chronicle. The aim of this research work is to identify radical text in social media. Our contributions are… More >

Displaying 1031-1040 on page 104 of 1124. Per Page