Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,329)
  • Open Access

    ARTICLE

    Toward Robust Classifiers for PDF Malware Detection

    Marwan Albahar*, Mohammed Thanoon, Monaj Alzilai, Alaa Alrehily, Munirah Alfaar, Maimoona Algamdi, Norah Alassaf

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2181-2202, 2021, DOI:10.32604/cmc.2021.018260 - 21 July 2021

    Abstract Malicious Portable Document Format (PDF) files represent one of the largest threats in the computer security space. Significant research has been done using handwritten signatures and machine learning based on detection via manual feature extraction. These approaches are time consuming, require substantial prior knowledge, and the list of features must be updated with each newly discovered vulnerability individually. In this study, we propose two models for PDF malware detection. The first model is a convolutional neural network (CNN) integrated into a standard deviation based regularization model to detect malicious PDF documents. The second model is a More >

  • Open Access

    ARTICLE

    An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques

    Fahd N. Al-Wesabi1,2,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1519-1536, 2021, DOI:10.32604/cmc.2021.018202 - 21 July 2021

    Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking… More >

  • Open Access

    ARTICLE

    Safest Route Detection via Danger Index Calculation and K-Means Clustering

    Isha Puthige1, Kartikay Bansal1, Chahat Bindra1, Mahekk Kapur1, Dilbag Singh1, Vipul Kumar Mishra1, Apeksha Aggarwal1, Jinhee Lee2, Byeong-Gwon Kang2, Yunyoung Nam2,*, Reham R. Mostafa3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2761-2777, 2021, DOI:10.32604/cmc.2021.018128 - 21 July 2021

    Abstract The study aims to formulate a solution for identifying the safest route between any two inputted Geographical locations. Using the New York City dataset, which provides us with location tagged crime statistics; we are implementing different clustering algorithms and analysed the results comparatively to discover the best-suited one. The results unveil the fact that the K-Means algorithm best suits for our needs and delivered the best results. Moreover, a comparative analysis has been performed among various clustering techniques to obtain best results. we compared all the achieved results and using the conclusions we have developed More >

  • Open Access

    ARTICLE

    Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning

    Muzamil Ahmed1,2, Muhammad Ramzan3,4, Hikmat Ullah Khan2, Saqib Iqbal5, Muhammad Attique Khan6, Jung-In Choi7, Yunyoung Nam8,*, Seifedine Kadry9

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2217-2230, 2021, DOI:10.32604/cmc.2021.018103 - 21 July 2021

    Abstract Violence recognition is crucial because of its applications in activities related to security and law enforcement. Existing semi-automated systems have issues such as tedious manual surveillances, which causes human errors and makes these systems less effective. Several approaches have been proposed using trajectory-based, non-object-centric, and deep-learning-based methods. Previous studies have shown that deep learning techniques attain higher accuracy and lower error rates than those of other methods. However, the their performance must be improved. This study explores the state-of-the-art deep learning architecture of convolutional neural networks (CNNs) and inception V4 to detect and recognize violence… More >

  • Open Access

    ARTICLE

    Brain Tumour Detection by Gamma DeNoised Wavelet Segmented Entropy Classifier

    Simy Mary Kurian1, Sujitha Juliet Devaraj1,*, Vinodh P. Vijayan2

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2093-2109, 2021, DOI:10.32604/cmc.2021.018090 - 21 July 2021

    Abstract Magnetic resonance imaging (MRI) is an essential tool for detecting brain tumours. However, identification of brain tumours in the early stages is a very complex task since MRI images are susceptible to noise and other environmental obstructions. In order to overcome these problems, a Gamma MAP denoised Strömberg wavelet segmentation based on a maximum entropy classifier (GMDSWS-MEC) model is developed for efficient tumour detection with high accuracy and low time consumption. The GMDSWS-MEC model performs three steps, namely pre-processing, segmentation, and classification. Within the GMDSWS-MEC model, the Gamma MAP filter performs the pre-processing task and… More >

  • Open Access

    ARTICLE

    Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features

    Marriam Nawaz1, Zahid Mehmood2,*, Tahira Nazir1, Momina Masood1, Usman Tariq3, Asmaa Mahdi Munshi4, Awais Mehmood1, Muhammad Rashid5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1927-1944, 2021, DOI:10.32604/cmc.2021.018052 - 21 July 2021

    Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also… More >

  • Open Access

    ARTICLE

    Advanced Community Identification Model for Social Networks

    Farhan Amin1, Jin-Ghoo Choi2, Gyu Sang Choi2,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1687-1707, 2021, DOI:10.32604/cmc.2021.017870 - 21 July 2021

    Abstract Community detection in social networks is a hard problem because of the size, and the need of a deep understanding of network structure and functions. While several methods with significant effort in this direction have been devised, an outstanding open problem is the unknown number of communities, it is generally believed that the role of influential nodes that are surrounded by neighbors is very important. In addition, the similarity among nodes inside the same cluster is greater than among nodes from other clusters. Lately, the global and local methods of community detection have been getting… More >

  • Open Access

    ARTICLE

    Development of a Smart Technique for Mobile Web Services Discovery

    Mohamed Eb-Saad1, Yunyoung Nam2,*, Hazem M. El-bakry1, Samir Abdelrazek1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1483-1501, 2021, DOI:10.32604/cmc.2021.017783 - 21 July 2021

    Abstract Web service (WS) presents a good solution to the interoperability of different types of systems that aims to reduce the overhead of high processing in a resource-limited environment. With the increasing demand for mobile WS (MWS), the WS discovery process has become a significant challenging point in the WS lifecycle that aims to identify the relevant MWSs that best match the service requests. This discovery process is a resource-consuming task that cannot be performed efficiently in a mobile computing environment due to the limitations of mobile devices. Meanwhile, a cloud computing can provide rich computing… More >

  • Open Access

    ARTICLE

    Outlier Detection of Mixed Data Based on Neighborhood Combinatorial Entropy

    Lina Wang1,2,*, Qixiang Zhang1, Xiling Niu1, Yongjun Ren3, Jinyue Xia4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1765-1781, 2021, DOI:10.32604/cmc.2021.017516 - 21 July 2021

    Abstract Outlier detection is a key research area in data mining technologies, as outlier detection can identify data inconsistent within a data set. Outlier detection aims to find an abnormal data size from a large data size and has been applied in many fields including fraud detection, network intrusion detection, disaster prediction, medical diagnosis, public security, and image processing. While outlier detection has been widely applied in real systems, its effectiveness is challenged by higher dimensions and redundant data attributes, leading to detection errors and complicated calculations. The prevalence of mixed data is a current issue… More >

  • Open Access

    ARTICLE

    Small Object Detection via Precise Region-Based Fully Convolutional Networks

    Dengyong Zhang1,2, Jiawei Hu1,2, Feng Li1,2,*, Xiangling Ding3, Arun Kumar Sangaiah4, Victor S. Sheng5

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1503-1517, 2021, DOI:10.32604/cmc.2021.017089 - 21 July 2021

    Abstract In the past several years, remarkable achievements have been made in the field of object detection. Although performance is generally improving, the accuracy of small object detection remains low compared with that of large object detection. In addition, localization misalignment issues are common for small objects, as seen in GoogLeNets and residual networks (ResNets). To address this problem, we propose an improved region-based fully convolutional network (R-FCN). The presented technique improves detection accuracy and eliminates localization misalignment by replacing position-sensitive region of interest (PS-RoI) pooling with position-sensitive precise region of interest (PS-Pr-RoI) pooling, which avoids More >

Displaying 3061-3070 on page 307 of 4329. Per Page