Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17)
  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core of the methodology lies in… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Stacked Auto-Encoder with Dynamic Differential Annealed Optimization for Skin Lesion Diagnosis

    Ahmad Alassaf*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2773-2789, 2023, DOI:10.32604/csse.2023.035899

    Abstract Intelligent diagnosis approaches with shallow architectural models play an essential role in healthcare. Deep Learning (DL) models with unsupervised learning concepts have been proposed because high-quality feature extraction and adequate labelled details significantly influence shallow models. On the other hand, skin lesion-based segregation and disintegration procedures play an essential role in earlier skin cancer detection. However, artefacts, an unclear boundary, poor contrast, and different lesion sizes make detection difficult. To address the issues in skin lesion diagnosis, this study creates the UDLS-DDOA model, an intelligent Unsupervised Deep Learning-based Stacked Auto-encoder (UDLS) optimized by Dynamic Differential Annealed Optimization (DDOA). Pre-processing, segregation,… More >

  • Open Access

    ARTICLE

    Deep Learning Models Based on Weakly Supervised Learning and Clustering Visualization for Disease Diagnosis

    Jingyao Liu1,2, Qinghe Feng4, Jiashi Zhao2,3, Yu Miao2,3, Wei He2, Weili Shi2,3, Zhengang Jiang2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2649-2665, 2023, DOI:10.32604/cmc.2023.038891

    Abstract The coronavirus disease 2019 (COVID-19) has severely disrupted both human life and the health care system. Timely diagnosis and treatment have become increasingly important; however, the distribution and size of lesions vary widely among individuals, making it challenging to accurately diagnose the disease. This study proposed a deep-learning disease diagnosis model based on weakly supervised learning and clustering visualization (W_CVNet) that fused classification with segmentation. First, the data were preprocessed. An optimizable weakly supervised segmentation preprocessing method (O-WSSPM) was used to remove redundant data and solve the category imbalance problem. Second, a deep-learning fusion method was used for feature extraction… More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open Access

    ARTICLE

    Profiling Astronomical Objects Using Unsupervised Learning Approach

    Theerapat Sangpetch1, Tossapon Boongoen1,*, Natthakan Iam-On2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1641-1655, 2023, DOI:10.32604/cmc.2023.026739

    Abstract Attempts to determine characters of astronomical objects have been one of major and vibrant activities in both astronomy and data science fields. Instead of a manual inspection, various automated systems are invented to satisfy the need, including the classification of light curve profiles. A specific Kaggle competition, namely Photometric LSST Astronomical Time-Series Classification Challenge (PLAsTiCC), is launched to gather new ideas of tackling the abovementioned task using the data set collected from the Large Synoptic Survey Telescope (LSST) project. Almost all proposed methods fall into the supervised family with a common aim to categorize each object into one of pre-defined… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >

  • Open Access

    ARTICLE

    P-ROCK: A Sustainable Clustering Algorithm for Large Categorical Datasets

    Ayman Altameem1, Ramesh Chandra Poonia2, Ankit Kumar3, Linesh Raja4, Abdul Khader Jilani Saudagar5,*

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 553-566, 2023, DOI:10.32604/iasc.2023.027579

    Abstract Data clustering is crucial when it comes to data processing and analytics. The new clustering method overcomes the challenge of evaluating and extracting data from big data. Numerical or categorical data can be grouped. Existing clustering methods favor numerical data clustering and ignore categorical data clustering. Until recently, the only way to cluster categorical data was to convert it to a numeric representation and then cluster it using current numeric clustering methods. However, these algorithms could not use the concept of categorical data for clustering. Following that, suggestions for expanding traditional categorical data processing methods were made. In addition to… More >

  • Open Access

    ARTICLE

    Printed Surface Defect Detection Model Based on Positive Samples

    Xin Zihao1, Wang Hongyuan1,*, Qi Pengyu1, Du Weidong2, Zhang Ji1, Chen Fuhua3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5925-5938, 2022, DOI:10.32604/cmc.2022.026943

    Abstract For a long time, the detection and extraction of printed surface defects has been a hot issue in the print industry. Nowadays, defect detection of a large number of products still relies on traditional image processing algorithms such as scale invariant feature transform (SIFT) and oriented fast and rotated brief (ORB), and researchers need to design algorithms for specific products. At present, a large number of defect detection algorithms based on object detection have been applied but need lots of labeling samples with defects. Besides, there are many kinds of defects in printed surface, so it is difficult to enumerate… More >

  • Open Access

    ARTICLE

    Feature Selection for Cluster Analysis in Spectroscopy

    Simon Crase1,2, Benjamin Hall2, Suresh N. Thennadil3,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2435-2458, 2022, DOI:10.32604/cmc.2022.022414

    Abstract Cluster analysis in spectroscopy presents some unique challenges due to the specific data characteristics in spectroscopy, namely, high dimensionality and small sample size. In order to improve cluster analysis outcomes, feature selection can be used to remove redundant or irrelevant features and reduce the dimensionality. However, for cluster analysis, this must be done in an unsupervised manner without the benefit of data labels. This paper presents a novel feature selection approach for cluster analysis, utilizing clusterability metrics to remove features that least contribute to a dataset's tendency to cluster. Two versions are presented and evaluated: The Hopkins clusterability filter which… More >

  • Open Access

    ARTICLE

    Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning

    M. Prabhavathy1,*, S. UmaMaheswari2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 101-114, 2022, DOI:10.32604/iasc.2022.018257

    Abstract Cloud computing utilizes various Internet-based technologies to enhance the Internet user experience. Cloud systems are on the rise, as this technology has completely revolutionized the digital industry. Currently, many users rely on cloud-based solutions to acquire business information and knowledge. As a result, cloud computing services such as SaaS and PaaS store a warehouse of sensitive and valuable information, which has turned the cloud systems into the obvious target for many malware creators and hackers. These malicious attackers attempt to gain illegal access to a myriad of valuable information such as user personal information, password, credit/debit card numbers, etc., from… More >

Displaying 1-10 on page 1 of 17. Per Page