Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (52)
  • Open Access

    ARTICLE

    An Improved Hybrid Deep Learning Approach for Security Requirements Classification

    Shoaib Hassan1,*, Qianmu Li1,*, Muhammad Zubair2, Rakan A. Alsowail3, Muhammad Umair2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4041-4067, 2025, DOI:10.32604/cmc.2025.059832 - 06 March 2025

    Abstract As the trend to use the latest machine learning models to automate requirements engineering processes continues, security requirements classification is tuning into the most researched field in the software engineering community. Previous literature studies have proposed numerous models for the classification of security requirements. However, adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning algorithms. Moreover, most of the researchers focus only on the classification of requirements with security keywords. They did not consider other nonfunctional requirements (NFR) directly or… More >

  • Open Access

    ARTICLE

    A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks

    Haydar Abdulameer Marhoon1,2,*, Rafid Sagban3,4, Atheer Y. Oudah1,5, Saadaldeen Rashid Ahmed6,7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4181-4218, 2025, DOI:10.32604/cmc.2025.058822 - 06 March 2025

    Abstract In order to address the critical security challenges inherent to Wireless Sensor Networks (WSNs), this paper presents a groundbreaking barrier-based machine learning technique. Vital applications like military operations, healthcare monitoring, and environmental surveillance increasingly deploy WSNs, recognizing the critical importance of effective intrusion detection in protecting sensitive data and maintaining operational integrity. The proposed method innovatively partitions the network into logical segments or virtual barriers, allowing for targeted monitoring and data collection that aligns with specific traffic patterns. This approach not only improves the diversit. There are more types of data in the training set,… More >

  • Open Access

    ARTICLE

    Novel Feature Extractor Framework in Conjunction with Supervised Three Class-XGBoost Algorithm for Osteosarcoma Detection from Whole Slide Medical Histopathology Images

    Tanzila Saba1, Muhammad Mujahid1, Shaha Al-Otaibi2, Noor Ayesha3, Amjad Rehman Khan1,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3337-3353, 2025, DOI:10.32604/cmc.2025.060163 - 17 February 2025

    Abstract Osteosarcomas are malignant neoplasms derived from undifferentiated osteogenic mesenchymal cells. It causes severe and permanent damage to human tissue and has a high mortality rate. The condition has the capacity to occur in any bone; however, it often impacts long bones like the arms and legs. Prompt identification and prompt intervention are essential for augmenting patient longevity. However, the intricate composition and erratic placement of osteosarcoma provide difficulties for clinicians in accurately determining the scope of the afflicted area. There is a pressing requirement for developing an algorithm that can automatically detect bone tumors with… More >

  • Open Access

    ARTICLE

    XGBoost-Based Power Grid Fault Prediction with Feature Enhancement: Application to Meteorology

    Kai Liu1, Meizhao Liu1, Ming Tang1, Chen Zhang2,*, Junwu Zhu2,3,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2893-2908, 2025, DOI:10.32604/cmc.2024.057074 - 17 February 2025

    Abstract The prediction of power grid faults based on meteorological factors is of great significance to reduce economic losses caused by power grid faults. However, the existing methods fail to effectively extract key features and accurately predict fault types due to the complexity of meteorological factors and their nonlinear relationships. In response to these challenges, we propose the Feature-Enhanced XGBoost power grid fault prediction method (FE-XGBoost). Specifically, we first combine the gradient boosting decision tree and recursive feature elimination method to extract essential features from meteorological data. Then, we incorporate a piecewise linear chaotic map to More >

  • Open Access

    ARTICLE

    Enhancing Network Security: Leveraging Machine Learning for Integrated Protection and Intrusion Detection

    Nada Mohammed Murad1, Adnan Yousif Dawod2, Saadaldeen Rashid Ahmed3,4,*, Ravi Sekhar5, Pritesh Shah5

    Intelligent Automation & Soft Computing, Vol.40, pp. 1-27, 2025, DOI:10.32604/iasc.2024.058624 - 10 January 2025

    Abstract This study introduces an innovative hybrid approach that integrates deep learning with blockchain technology to improve cybersecurity, focusing on network intrusion detection systems (NIDS). The main goal is to overcome the shortcomings of conventional intrusion detection techniques by developing a more flexible and robust security architecture. We use seven unique machine learning models to improve detection skills, emphasizing data quality, traceability, and transparency, facilitated by a blockchain layer that safeguards against data modification and ensures auditability. Our technique employs the Synthetic Minority Oversampling Technique (SMOTE) to equilibrate the dataset, therefore mitigating prevalent class imbalance difficulties… More >

  • Open Access

    ARTICLE

    An Improved Practical Byzantine Fault-Tolerant Algorithm Based on XGBoost Grouping for Consortium Chains

    Xiaowei Wang, Haiyang Zhang, Jiasheng Zhang, Yingkai Ge, Kexin Cui, Zifu Peng, Zhengyi Li, Lihua Wang*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1295-1311, 2025, DOI:10.32604/cmc.2024.058559 - 03 January 2025

    Abstract In response to the challenges presented by the unreliable identity of the master node, high communication overhead, and limited network support size within the Practical Byzantine Fault-Tolerant (PBFT) algorithm for consortium chains, we propose an improved PBFT algorithm based on XGBoost grouping called XG-PBFT in this paper. XG-PBFT constructs a dataset by training important parameters that affect node performance, which are used as classification indexes for nodes. The XGBoost algorithm then is employed to train the dataset, and nodes joining the system will be grouped according to the trained grouping model. Among them, the nodes… More >

  • Open Access

    ARTICLE

    IDSSCNN-XgBoost: Improved Dual-Stream Shallow Convolutional Neural Network Based on Extreme Gradient Boosting Algorithm for Micro Expression Recognition

    Adnan Ahmad, Zhao Li*, Irfan Tariq, Zhengran He

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 729-749, 2025, DOI:10.32604/cmc.2024.055768 - 03 January 2025

    Abstract Micro-expressions (ME) recognition is a complex task that requires advanced techniques to extract informative features from facial expressions. Numerous deep neural networks (DNNs) with convolutional structures have been proposed. However, unlike DNNs, shallow convolutional neural networks often outperform deeper models in mitigating overfitting, particularly with small datasets. Still, many of these methods rely on a single feature for recognition, resulting in an insufficient ability to extract highly effective features. To address this limitation, in this paper, an Improved Dual-stream Shallow Convolutional Neural Network based on an Extreme Gradient Boosting Algorithm (IDSSCNN-XgBoost) is introduced for ME… More >

  • Open Access

    ARTICLE

    XGBoost Based Multiclass NLOS Channels Identification in UWB Indoor Positioning System

    Ammar Fahem Majeed1,2,*, Rashidah Arsat1, Muhammad Ariff Baharudin1, Nurul Mu’azzah Abdul Latiff1, Abbas Albaidhani3

    Computer Systems Science and Engineering, Vol.49, pp. 159-183, 2025, DOI:10.32604/csse.2024.058741 - 03 January 2025

    Abstract Accurate non-line of sight (NLOS) identification technique in ultra-wideband (UWB) location-based services is critical for applications like drone communication and autonomous navigation. However, current methods using binary classification (LOS/NLOS) oversimplify real-world complexities, with limited generalisation and adaptability to varying indoor environments, thereby reducing the accuracy of positioning. This study proposes an extreme gradient boosting (XGBoost) model to identify multi-class NLOS conditions. We optimise the model using grid search and genetic algorithms. Initially, the grid search approach is used to identify the most favourable values for integer hyperparameters. In order to achieve an optimised model configuration,… More >

  • Open Access

    ARTICLE

    Stability Prediction in Smart Grid Using PSO Optimized XGBoost Algorithm with Dynamic Inertia Weight Updation

    Adel Binbusayyis*, Mohemmed Sha

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 909-931, 2025, DOI:10.32604/cmes.2024.058202 - 17 December 2024

    Abstract Prediction of stability in SG (Smart Grid) is essential in maintaining consistency and reliability of power supply in grid infrastructure. Analyzing the fluctuations in power generation and consumption patterns of smart cities assists in effectively managing continuous power supply in the grid. It also possesses a better impact on averting overloading and permitting effective energy storage. Even though many traditional techniques have predicted the consumption rate for preserving stability, enhancement is required in prediction measures with minimized loss. To overcome the complications in existing studies, this paper intends to predict stability from the smart grid… More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

Displaying 1-10 on page 1 of 52. Per Page