Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,005)
  • Open Access

    ARTICLE

    Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Mohammed Rizwanullah5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6257-6270, 2022, DOI:10.32604/cmc.2022.021212 - 11 October 2021

    Abstract Cybersecurity encompasses various elements such as strategies, policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks. In this scenario, the rising popularity of Online Social Networks (OSN) is under threat from spammers for which effective spam bot detection approaches should be developed. Earlier studies have developed different approaches for the detection of spam bots in OSN. But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored. With this… More >

  • Open Access

    ARTICLE

    Machine Learning Based Depression, Anxiety, and Stress Predictive Model During COVID-19 Crisis

    Fahd N. Al-Wesabi1,2,*, Hadeel Alsolai3, Anwer Mustafa Hilal4, Manar Ahmed Hamza4, Mesfer Al Duhayyim5, Noha Negm6,7

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5803-5820, 2022, DOI:10.32604/cmc.2022.021195 - 11 October 2021

    Abstract Corona Virus Disease-2019 (COVID-19) was reported at first in Wuhan city, China by December 2019. World Health Organization (WHO) declared COVID-19 as a pandemic i.e., global health crisis on March 11, 2020. The outbreak of COVID-19 pandemic and subsequent lockdowns to curb the spread, not only affected the economic status of a number of countries, but it also resulted in increased levels of Depression, Anxiety, and Stress (DAS) among people. Therefore, there is a need exists to comprehend the relationship among psycho-social factors in a country that is hypothetically affected by high levels of stress and… More >

  • Open Access

    ARTICLE

    Graph Transformer for Communities Detection in Social Networks

    G. Naga Chandrika1, Khalid Alnowibet2, K. Sandeep Kautish3, E. Sreenivasa Reddy4, Adel F. Alrasheedi2, Ali Wagdy Mohamed5,6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5707-5720, 2022, DOI:10.32604/cmc.2022.021186 - 11 October 2021

    Abstract Graphs are used in various disciplines such as telecommunication, biological networks, as well as social networks. In large-scale networks, it is challenging to detect the communities by learning the distinct properties of the graph. As deep learning has made contributions in a variety of domains, we try to use deep learning techniques to mine the knowledge from large-scale graph networks. In this paper, we aim to provide a strategy for detecting communities using deep autoencoders and obtain generic neural attention to graphs. The advantages of neural attention are widely seen in the field of NLP… More >

  • Open Access

    ARTICLE

    Dual-Port Content Addressable Memory for Cache Memory Applications

    Allam Abumwais1,*, Adil Amirjanov1, Kaan Uyar1, Mujahed Eleyat2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4583-4597, 2022, DOI:10.32604/cmc.2022.020529 - 11 October 2021

    Abstract Multicore systems oftentimes use multiple levels of cache to bridge the gap between processor and memory speed. This paper presents a new design of a dedicated pipeline cache memory for multicore processors called dual port content addressable memory (DPCAM). In addition, it proposes a new replacement algorithm based on hardware which is called a near-far access replacement algorithm (NFRA) to reduce the cost overhead of the cache controller and improve the cache access latency. The experimental results indicated that the latency for write and read operations are significantly less in comparison with a set-associative cache More >

  • Open Access

    ARTICLE

    Sentiment Analysis on Social Media Using Genetic Algorithm with CNN

    Dharmendra Dangi*, Amit Bhagat, Dheeraj Kumar Dixit

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5399-5419, 2022, DOI:10.32604/cmc.2022.020431 - 11 October 2021

    Abstract There are various intense forces causing customers to use evaluated data when using social media platforms and microblogging sites. Today, customers throughout the world share their points of view on all kinds of topics through these sources. The massive volume of data created by these customers makes it impossible to analyze such data manually. Therefore, an efficient and intelligent method for evaluating social media data and their divergence needs to be developed. Today, various types of equipment and techniques are available for automatically estimating the classification of sentiments. Sentiment analysis involves determining people's emotions using… More >

  • Open Access

    ARTICLE

    Short Text Mining for Classifying Educational Objectives and Outcomes

    Yousef Asiri*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 35-50, 2022, DOI:10.32604/csse.2022.020100 - 08 October 2021

    Abstract Most of the international accreditation bodies in engineering education (e.g., ABET) and outcome-based educational systems have based their assessments on learning outcomes and program educational objectives. However, mapping program educational objectives (PEOs) to student outcomes (SOs) is a challenging and time-consuming task, especially for a new program which is applying for ABET-EAC (American Board for Engineering and Technology the American Board for Engineering and Technology—Engineering Accreditation Commission) accreditation. In addition, ABET needs to automatically ensure that the mapping (classification) is reasonable and correct. The classification also plays a vital role in the assessment of students’… More >

  • Open Access

    ARTICLE

    Cross Intelligence Evaluation for Effective Emotional Intelligence Estimation

    Ibrahim Alsukayti1, Aman Singh2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2489-2505, 2022, DOI:10.32604/cmc.2022.020264 - 27 September 2021

    Abstract A famous psychologist or researcher, Daniel Goleman, gave a theory on the importance of Emotional Intelligence for the success of an individual’s life. Daniel Goleman quoted in the research that “The contribution of an individual’s Intelligence Quotient (IQ) is only 20% for their success, the remaining 80% is due to Emotional Intelligence (EQ)”. However, in the absence of a reliable technique for EQ evaluation, this factor of overall intelligence is ignored in most of the intelligence evaluation mechanisms. This research presented an analysis based on basic statistical tools along with more sophisticated deep learning tools.… More >

  • Open Access

    ARTICLE

    Analysis of Distance-Based Topological Polynomials Associated with Zero-Divisor Graphs

    Ali Ahmad1, Roslan Hasni2,*, Nahid Akhter3, Kashif Elahi4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2895-2904, 2022, DOI:10.32604/cmc.2022.015644 - 27 September 2021

    Abstract Chemical compounds are modeled as graphs. The atoms of molecules represent the graph vertices while chemical bonds between the atoms express the edges. The topological indices representing the molecular graph corresponds to the different chemical properties of compounds. Let be are two positive integers, and be the zero-divisor graph of the commutative ring . In this article some direct questions have been answered that can be utilized latterly in different applications. This study starts with simple computations, leading to a quite complex ring theoretic problems to prove certain properties. The theory of finite commutative rings More >

  • Open Access

    ARTICLE

    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938 - 24 September 2021

    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is… More >

  • Open Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467 - 24 September 2021

    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable… More >

Displaying 521-530 on page 53 of 1005. Per Page