Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,430)
  • Open Access

    ARTICLE

    Recognition and Detection of Diabetic Retinopathy Using Densenet-65 Based Faster-RCNN

    Saleh Albahli1, Tahira Nazir2,*, Aun Irtaza2, Ali Javed3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1333-1351, 2021, DOI:10.32604/cmc.2021.014691 - 05 February 2021

    Abstract Diabetes is a metabolic disorder that results in a retinal complication called diabetic retinopathy (DR) which is one of the four main reasons for sightlessness all over the globe. DR usually has no clear symptoms before the onset, thus making disease identification a challenging task. The healthcare industry may face unfavorable consequences if the gap in identifying DR is not filled with effective automation. Thus, our objective is to develop an automatic and cost-effective method for classifying DR samples. In this work, we present a custom Faster-RCNN technique for the recognition and classification of DR… More >

  • Open Access

    ARTICLE

    Fusion-Based Machine Learning Architecture for Heart Disease Prediction

    Muhammad Waqas Nadeem1,2, Hock Guan Goh1,*, Muhammad Adnan Khan3, Muzammil Hussain4, Muhammad Faheem Mushtaq5, Vasaki a/p Ponnusamy1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2481-2496, 2021, DOI:10.32604/cmc.2021.014649 - 05 February 2021

    Abstract The contemporary evolution in healthcare technologies plays a considerable and significant role to improve medical services and save human lives. Heart disease or cardiovascular disease is the most fatal and complex disease which it is hardly to be detected through our naked eyes, as numerous people have been suffering from this disease globally. Heart attacks occur when the ranges of vital signs such as blood pressure, pulse rate, and body temperature exceed their normal values. The efficient diagnosis of heart diseases could play a substantial role in the field of cardiology, while diagnostic time could… More >

  • Open Access

    ARTICLE

    Real-Time Anomaly Detection in Packaged Food X-Ray Images Using Supervised Learning

    Kangjik Kim1, Hyunbin Kim1, Junchul Chun1, Mingoo Kang2, Min Hong3,*, Byungseok Min4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2547-2568, 2021, DOI:10.32604/cmc.2021.014642 - 05 February 2021

    Abstract Physical contamination of food occurs when it comes into contact with foreign objects. Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as broken teeth or choking. Therefore, a preventive method that can detect and remove foreign objects in advance is required. Several studies have attempted to detect defective products using deep learning networks. Because it is difficult to obtain foreign object-containing food data from industry, most studies on industrial anomaly detection have used unsupervised learning methods. This paper proposes a new method… More >

  • Open Access

    ARTICLE

    An Effective Memory Analysis for Malware Detection and Classification

    Rami Sihwail*, Khairuddin Omar, Khairul Akram Zainol Ariffin

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2301-2320, 2021, DOI:10.32604/cmc.2021.014510 - 05 February 2021

    Abstract The study of malware behaviors, over the last years, has received tremendous attention from researchers for the purpose of reducing malware risks. Most of the investigating experiments are performed using either static analysis or behavior analysis. However, recent studies have shown that both analyses are vulnerable to modern malware files that use several techniques to avoid analysis and detection. Therefore, extracted features could be meaningless and a distraction for malware analysts. However, the volatile memory can expose useful information about malware behaviors and characteristics. In addition, memory analysis is capable of detecting unconventional malware, such… More >

  • Open Access

    REVIEW

    Automated Test Case Generation from Requirements: A Systematic Literature Review

    Ahmad Mustafa1, Wan M. N. Wan-Kadir1, Noraini Ibrahim1, Muhammad Arif Shah3,*, Muhammad Younas2, Atif Khan4, Mahdi Zareei5, Faisal Alanazi6

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1819-1833, 2021, DOI:10.32604/cmc.2021.014391 - 05 February 2021

    Abstract Software testing is an important and cost intensive activity in software development. The major contribution in cost is due to test case generations. Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure. Requirement-based testing includes functional and nonfunctional requirements. The objective of this study is to explore the approaches that generate test cases from requirements. A systematic literature review based on two research questions and extensive quality assessment criteria includes studies. The study identifies 30 primary studies from 410 studies spanned from 2000 to 2018.… More >

  • Open Access

    ARTICLE

    Technology Landscape for Epidemiological Prediction and Diagnosis of COVID-19

    Siddhant Banyal1, Rinky Dwivedi2, Koyel Datta Gupta2, Deepak Kumar Sharma3,*, Fadi Al-Turjman4, Leonardo Mostarda5

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1679-1696, 2021, DOI:10.32604/cmc.2021.014387 - 05 February 2021

    Abstract The COVID-19 outbreak initiated from the Chinese city of Wuhan and eventually affected almost every nation around the globe. From China, the disease started spreading to the rest of the world. After China, Italy became the next epicentre of the virus and witnessed a very high death toll. Soon nations like the USA became severely hit by SARS-CoV-2 virus. The World Health Organisation, on 11th March 2020, declared COVID-19 a pandemic. To combat the epidemic, the nations from every corner of the world has instituted various policies like physical distancing, isolation of infected population and… More >

  • Open Access

    ARTICLE

    Epidemiologic Evolution Platform Using Integrated Modeling and Geographic Information System

    Adrian Brezulianu1, Oana Geman2,*, Muhammad Arif3, Iuliana Chiuchisan2, Octavian Postolache2, Guojun Wang3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1645-1663, 2021, DOI:10.32604/cmc.2021.014225 - 05 February 2021

    Abstract At the international level, a major effort is being made to optimize the flow of data and information for health systems management. The studies show that medical and economic efficiency is strongly influenced by the level of development and complexity of implementing an integrated system of epidemiological monitoring and modeling. The solution proposed and described in this paper is addressed to all public and private institutions involved in the fight against the COVID-19 pandemic, using recognized methods and standards in this field. The Green-Epidemio is a platform adaptable to the specific features of any public… More >

  • Open Access

    ARTICLE

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223 - 05 February 2021

    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Using FKNN and Improved PSO

    Raniyah Wazirali*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1429-1445, 2021, DOI:10.32604/cmc.2021.014172 - 05 February 2021

    Abstract Intrusion detection system (IDS) techniques are used in cybersecurity to protect and safeguard sensitive assets. The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism. The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor (FKNN) algorithm. Using this method, two parameters, i.e., the neighborhood size (k) and fuzzy strength parameter (m) were characterized by implementing the particle swarm optimization (PSO). In addition to being used for FKNN parametric optimization, PSO is also used for selecting the conditional feature subsets for… More >

  • Open Access

    ARTICLE

    Exploiting Deep Learning Techniques for Colon Polyp Segmentation

    Daniel Sierra-Sosa1,*, Sebastian Patino-Barrientos2, Begonya Garcia-Zapirain3, Cristian Castillo-Olea3, Adel Elmaghraby1

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1629-1644, 2021, DOI:10.32604/cmc.2021.013618 - 05 February 2021

    Abstract As colon cancer is among the top causes of death, there is a growing interest in developing improved techniques for the early detection of colon polyps. Given the close relation between colon polyps and colon cancer, their detection helps avoid cancer cases. The increment in the availability of colorectal screening tests and the number of colonoscopies have increased the burden on the medical personnel. In this article, the application of deep learning techniques for the detection and segmentation of colon polyps in colonoscopies is presented. Four techniques were implemented and evaluated: Mask-RCNN, PANet, Cascade R-CNN… More >

Displaying 3371-3380 on page 338 of 4430. Per Page