Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,375)
  • Open Access

    ARTICLE

    Machine Learning Stroke Prediction in Smart Healthcare: Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques

    Abdul Ahad1,2, Ira Puspitasari1,3,*, Jiangbin Zheng2, Shamsher Ullah4, Farhan Ullah5, Sheikh Tahir Bakhsh6, Ivan Miguel Pires7,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5115-5134, 2025, DOI:10.32604/cmc.2025.062605 - 06 March 2025

    Abstract This research explores the use of Fuzzy K-Nearest Neighbor (F-KNN) and Artificial Neural Networks (ANN) for predicting heart stroke incidents, focusing on the impact of feature selection methods, specifically Chi-Square and Best First Search (BFS). The study demonstrates that BFS significantly enhances the performance of both classifiers. With BFS preprocessing, the ANN model achieved an impressive accuracy of 97.5%, precision and recall of 97.5%, and an Receiver Operating Characteristics (ROC) area of 97.9%, outperforming the Chi-Square-based ANN, which recorded an accuracy of 91.4%. Similarly, the F-KNN model with BFS achieved an accuracy of 96.3%, precision More >

  • Open Access

    ARTICLE

    Enhancing Malware Detection Resilience: A U-Net GAN Denoising Framework for Image-Based Classification

    Huiyao Dong1, Igor Kotenko2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4263-4285, 2025, DOI:10.32604/cmc.2025.062439 - 06 March 2025

    Abstract The growing complexity of cyber threats requires innovative machine learning techniques, and image-based malware classification opens up new possibilities. Meanwhile, existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection, and there is a critical gap in using noise simulation as a means of replicating real-world malware obfuscation techniques and adopting denoising framework to counteract these challenges. This study introduces an image denoising technique based on a U-Net combined with a GAN framework to address noise interference and obfuscation challenges in image-based malware analysis. The… More >

  • Open Access

    REVIEW

    Artificial Intelligence Revolutionising the Automotive Sector: A Comprehensive Review of Current Insights, Challenges, and Future Scope

    Md Naeem Hossain1, Md. Abdur Rahim2, Md Mustafizur Rahman1,3,*, Devarajan Ramasamy1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3643-3692, 2025, DOI:10.32604/cmc.2025.061749 - 06 March 2025

    Abstract The automotive sector is crucial in modern society, facilitating essential transportation needs across personal, commercial, and logistical domains while significantly contributing to national economic development and employment generation. The transformative impact of Artificial Intelligence (AI) has revolutionised multiple facets of the automotive industry, encompassing intelligent manufacturing processes, diagnostic systems, control mechanisms, supply chain operations, customer service platforms, and traffic management solutions. While extensive research exists on the above aspects of AI applications in automotive contexts, there is a compelling need to synthesise this knowledge comprehensively to guide and inspire future research. This review introduces a… More >

  • Open Access

    ARTICLE

    Neural Network Algorithm Based on LVQ for Myocardial Infarction Detection and Localization Using Multi-Lead ECG Data

    Kassymbek Ozhikenov1, Zhadyra Alimbayeva1,*, Chingiz Alimbayev1,2,*, Aiman Ozhikenova1, Yeldos Altay1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5257-5284, 2025, DOI:10.32604/cmc.2025.061508 - 06 March 2025

    Abstract Myocardial infarction (MI) is one of the leading causes of death globally among cardiovascular diseases, necessitating modern and accurate diagnostics for cardiac patient conditions. Among the available functional diagnostic methods, electrocardiography (ECG) is particularly well-known for its ability to detect MI. However, confirming its accuracy—particularly in identifying the localization of myocardial damage—often presents challenges in practice. This study, therefore, proposes a new approach based on machine learning models for the analysis of 12-lead ECG data to accurately identify the localization of MI. In particular, the learning vector quantization (LVQ) algorithm was applied, considering the contribution… More >

  • Open Access

    ARTICLE

    YOLO-SIFD: YOLO with Sliced Inference and Fractal Dimension Analysis for Improved Fire and Smoke Detection

    Mariam Ishtiaq1,2, Jong-Un Won1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5343-5361, 2025, DOI:10.32604/cmc.2025.061466 - 06 March 2025

    Abstract Fire detection has held stringent importance in computer vision for over half a century. The development of early fire detection strategies is pivotal to the realization of safe and smart cities, inhabitable in the future. However, the development of optimal fire and smoke detection models is hindered by limitations like publicly available datasets, lack of diversity, and class imbalance. In this work, we explore the possible ways forward to overcome these challenges posed by available datasets. We study the impact of a class-balanced dataset to improve the fire detection capability of state-of-the-art (SOTA) vision-based models and proposeMore >

  • Open Access

    ARTICLE

    GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing

    Sang-Hoon Choi1, Ki-Woong Park2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4021-4039, 2025, DOI:10.32604/cmc.2025.061267 - 06 March 2025

    Abstract The proliferation of Internet of Things (IoT) devices has established edge computing as a critical paradigm for real-time data analysis and low-latency processing. Nevertheless, the distributed nature of edge computing presents substantial security challenges, rendering it a prominent target for sophisticated malware attacks. Existing signature-based and behavior-based detection methods are ineffective against the swiftly evolving nature of malware threats and are constrained by the availability of resources. This paper suggests the Genetic Encoding for Novel Optimization of Malware Evaluation (GENOME) framework, a novel solution that is intended to improve the performance of malware detection and… More >

  • Open Access

    ARTICLE

    Hybrid Memory-Enhanced Autoencoder with Adversarial Training for Anomaly Detection in Virtual Power Plants

    Yuqiao Liu1, Chen Pan1, YeonJae Oh2,*, Chang Gyoon Lim1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4593-4629, 2025, DOI:10.32604/cmc.2025.061196 - 06 March 2025

    Abstract Virtual Power Plants (VPPs) are integral to modern energy systems, providing stability and reliability in the face of the inherent complexities and fluctuations of solar power data. Traditional anomaly detection methodologies often need to adequately handle these fluctuations from solar radiation and ambient temperature variations. We introduce the Memory-Enhanced Autoencoder with Adversarial Training (MemAAE) model to overcome these limitations, designed explicitly for robust anomaly detection in VPP environments. The MemAAE model integrates three principal components: an LSTM-based autoencoder that effectively captures temporal dynamics to distinguish between normal and anomalous behaviors, an adversarial training module that… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    YOLO-S3DT: A Small Target Detection Model for UAV Images Based on YOLOv8

    Pengcheng Gao*, Zhenjiang Li

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4555-4572, 2025, DOI:10.32604/cmc.2025.060873 - 06 March 2025

    Abstract The application of deep learning for target detection in aerial images captured by Unmanned Aerial Vehicles (UAV) has emerged as a prominent research focus. Due to the considerable distance between UAVs and the photographed objects, coupled with complex shooting environments, existing models often struggle to achieve accurate real-time target detection. In this paper, a You Only Look Once v8 (YOLOv8) model is modified from four aspects: the detection head, the up-sampling module, the feature extraction module, and the parameter optimization of positive sample screening, and the YOLO-S3DT model is proposed to improve the performance of More >

Displaying 1-10 on page 1 of 3375. Per Page