Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (123)
  • Open Access

    ARTICLE

    Supervised Machine Learning-Based Prediction of COVID-19

    Atta-ur-Rahman1, Kiran Sultan3, Iftikhar Naseer4, Rizwan Majeed5, Dhiaa Musleh1, Mohammed Abdul Salam Gollapalli2, Sghaier Chabani2, Nehad Ibrahim1, Shahan Yamin Siddiqui6,7, Muhammad Adnan Khan8,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 21-34, 2021, DOI:10.32604/cmc.2021.013453

    Abstract COVID-19 turned out to be an infectious and life-threatening viral disease, and its swift and overwhelming spread has become one of the greatest challenges for the world. As yet, no satisfactory vaccine or medication has been developed that could guarantee its mitigation, though several efforts and trials are underway. Countries around the globe are striving to overcome the COVID-19 spread and while they are finding out ways for early detection and timely treatment. In this regard, healthcare experts, researchers and scientists have delved into the investigation of existing as well as new technologies. The situation demands development of a clinical… More >

  • Open Access

    ARTICLE

    Emotional Analysis of Arabic Saudi Dialect Tweets Using a Supervised Learning Approach

    Abeer A. AlFutamani, Heyam H. Al-Baity*

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 89-109, 2021, DOI:10.32604/iasc.2021.016555

    Abstract Social media sites produce a large amount of data and offer a highly competitive advantage for companies when they can benefit from and address data, as data provides a deeper understanding of clients and their needs. This understanding of clients helps in effectively making the correct decisions within the company, based on data obtained from social media websites. Thus, sentiment analysis has become a key tool for understanding that data. Sentiment analysis is a research area that focuses on analyzing people’s emotions and opinions to identify the polarity (e.g., positive or negative) of a given text. Since we need to… More >

  • Open Access

    ARTICLE

    DTLM-DBP: Deep Transfer Learning Models for DNA Binding Proteins Identification

    Sara Saber1, Uswah Khairuddin2,*, Rubiyah Yusof2, Ahmed Madani1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3563-3576, 2021, DOI:10.32604/cmc.2021.017769

    Abstract The identification of DNA binding proteins (DNABPs) is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g., in the study of the biological, biophysical, and biochemical effects of antibiotics, drugs, and steroids on DNA. This paper presents an efficient approach for DNABPs identification based on deep transfer learning, named “DTLM-DBP.” Two transfer learning methods are used in the identification process. The first is based on the pre-trained deep learning model as a feature’s extractor and classifier. Two different pre-trained Convolutional Neural Networks (CNN), AlexNet 8 and VGG… More >

  • Open Access

    ARTICLE

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    Thavavel Vaiyapuri*, Adel Binbusayyis

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3271-3288, 2021, DOI:10.32604/cmc.2021.017665

    Abstract In the era of Big data, learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system (IDS). Owing to the lack of accurately labeled network traffic data, many unsupervised feature representation learning models have been proposed with state-of-the-art performance. Yet, these models fail to consider the classification error while learning the feature representation. Intuitively, the learnt feature representation may degrade the performance of the classification task. For the first time in the field of intrusion detection, this paper proposes an unsupervised IDS model leveraging the… More >

  • Open Access

    ARTICLE

    Research on Feature Extraction Method of Social Network Text

    Zheng Zhang*, Shu Zhou

    Journal of New Media, Vol.3, No.2, pp. 73-80, 2021, DOI:10.32604/jnm.2021.018923

    Abstract The development of various applications based on social network text is in full swing. Studying text features and classifications is of great value to extract important information. This paper mainly introduces the common feature selection algorithms and feature representation methods, and introduces the basic principles, advantages and disadvantages of SVM and KNN, and the evaluation indexes of classification algorithms. In the aspect of mutual information feature selection function, it describes its processing flow, shortcomings and optimization improvements. In view of its weakness in not balancing the positive and negative correlation characteristics, a balance weight attribute factor and feature difference factor… More >

  • Open Access

    ARTICLE

    Identification of Abnormal Patterns in AR (1) Process Using CS-SVM

    Hongshuo Zhang1, Bo Zhu1,*, Kaimin Pang1, Chunmei Chen1, Yuwei Wan2

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 797-810, 2021, DOI:10.32604/iasc.2021.017232

    Abstract Using machine learning method to recognize abnormal patterns covers the shortage of traditional control charts for autocorrelation processes, which violate the applicable conditions of the control chart, i.e., the independent identically distributed (IID) assumption. In this study, we propose a recognition model based on support vector machine (SVM) for the AR (1) type of autocorrelation process. For achieving a higher recognition performance, the cuckoo search algorithm (CS) is used to optimize the two hyper-parameters of SVM, namely the penalty parameter c and the radial basis kernel parameter g. By using Monte Carlo simulation methods, the data sets containing samples of… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule tree method are adopted to… More >

  • Open Access

    ARTICLE

    Prediction Model for Gas Outburst Intensity of Coal Mining Face Based on Improved PSO and LSSVM

    Haibo Liu1,*, Yujie Dong2, Fuzhong Wang1

    Energy Engineering, Vol.118, No.3, pp. 679-689, 2021, DOI: 10.32604/EE.2021.014630

    Abstract For the problems of nonlinearity, uncertainty and low prediction accuracy in the gas outburst prediction of coal mining face, the least squares support vector machine (LSSVM) is proposed to establish the prediction model. Firstly, considering the inertia coefficients as global parameters lacks the ability to improve the solution for the traditional particle swarm optimization (PSO), an improved PSO (IPSO) algorithm is introduced to adjust different inertia weights in updating the particle swarm and solve the fitness to stagnate. Secondly, the penalty factor and kernel function parameter of LSSVM are searched automatically, and the regression accuracy and generalization performance is enhanced… More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has two objectives; The first one… More >

  • Open Access

    ARTICLE

    Ensemble Machine Learning Based Identification of Pediatric Epilepsy

    Shamsah Majed Alotaibi1, Atta-ur-Rahman1, Mohammed Imran Basheer1, Muhammad Adnan Khan2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 149-165, 2021, DOI:10.32604/cmc.2021.015976

    Abstract Epilepsy is a type of brain disorder that causes recurrent seizures. It is the second most common neurological disease after Alzheimer’s. The effects of epilepsy in children are serious, since it causes a slower growth rate and a failure to develop certain skills. In the medical field, specialists record brain activity using an Electroencephalogram (EEG) to observe the epileptic seizures. The detection of these seizures is performed by specialists, but the results might not be accurate due to human errors; therefore, automated detection of epileptic pediatric seizures might be the optimal solution. This paper investigates the detection of epileptic seizures… More >

Displaying 81-90 on page 9 of 123. Per Page