Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    Eye-Tracking Based Autism Spectrum Disorder Diagnosis Using Chaotic Butterfly Optimization with Deep Learning Model

    Tamilvizhi Thanarajan1, Youseef Alotaibi2, Surendran Rajendran3,*, Krishnaraj Nagappan4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1995-2013, 2023, DOI:10.32604/cmc.2023.039644

    Abstract Autism spectrum disorder (ASD) can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics, like changes in behavior, social disabilities, and difficulty communicating with others. Eye tracking (ET) has become a useful method to detect ASD. One vital aspect of moral erudition is the aptitude to have common visual attention. The eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early detection. Eye-tracking data can offer insightful information about the behavior and thought processes of people with ASD, but it is important to be aware of its limitations… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

  • Open Access

    ARTICLE

    Improved Monarchy Butterfly Optimization Algorithm (IMBO): Intrusion Detection Using Mapreduce Framework Based Optimized ANU-Net

    Kunda Suresh Babu, Yamarthi Narasimha Rao*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5887-5909, 2023, DOI:10.32604/cmc.2023.037486

    Abstract The demand for cybersecurity is rising recently due to the rapid improvement of network technologies. As a primary defense mechanism, an intrusion detection system (IDS) was anticipated to adapt and secure computing infrastructures from the constantly evolving, sophisticated threat landscape. Recently, various deep learning methods have been put forth; however, these methods struggle to recognize all forms of assaults, especially infrequent attacks, because of network traffic imbalances and a shortage of aberrant traffic samples for model training. This work introduces deep learning (DL) based Attention based Nested U-Net (ANU-Net) for intrusion detection to address these issues and enhance detection performance.… More >

  • Open Access

    ARTICLE

    Fruit Leaf Diseases Classification: A Hierarchical Deep Learning Framework

    Samra Rehman1, Muhammad Attique Khan1, Majed Alhaisoni2, Ammar Armghan3, Fayadh Alenezi3, Abdullah Alqahtani4, Khean Vesal5, Yunyoung Nam5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1179-1194, 2023, DOI:10.32604/cmc.2023.035324

    Abstract Manual inspection of fruit diseases is a time-consuming and costly because it is based on naked-eye observation. The authors present computer vision techniques for detecting and classifying fruit leaf diseases. Examples of computer vision techniques are preprocessing original images for visualization of infected regions, feature extraction from raw or segmented images, feature fusion, feature selection, and classification. The following are the major challenges identified by researchers in the literature: (i) low-contrast infected regions extract irrelevant and redundant information, which misleads classification accuracy; (ii) irrelevant and redundant information may increase computational time and reduce the designed model’s accuracy. This paper proposed… More >

  • Open Access

    ARTICLE

    Deep Neural Network Based Cardio Vascular Disease Prediction Using Binarized Butterfly Optimization

    S. Amutha*, J. Raja Sekar

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1863-1880, 2023, DOI:10.32604/iasc.2023.028903

    Abstract In this digital era, Cardio Vascular Disease (CVD) has become the leading cause of death which has led to the mortality of 17.9 million lives each year. Earlier Diagnosis of the people who are at higher risk of CVDs helps them to receive proper treatment and helps prevent deaths. It becomes inevitable to propose a solution to predict the CVD with high accuracy. A system for predicting Cardio Vascular Disease using Deep Neural Network with Binarized Butterfly Optimization Algorithm (DNN–BBoA) is proposed. The BBoA is incorporated to select the best features. The optimal features are fed to the deep neural… More >

  • Open Access

    ARTICLE

    Content-Based Movie Recommendation System Using MBO with DBN

    S. Sridhar1,*, D. Dhanasekaran2, G. Charlyn Pushpa Latha3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3241-3257, 2023, DOI:10.32604/iasc.2023.030361

    Abstract The content-based filtering technique has been used effectively in a variety of Recommender Systems (RS). The user explicitly or implicitly provides data in the Content-Based Recommender System. The system collects this data and creates a profile for all the users, and the recommendation is generated by the user profile. The recommendation generated via content-based filtering is provided by observing just a single user’s profile. The primary objective of this RS is to recommend a list of movies based on the user’s preferences. A content-based movie recommendation model is proposed in this research, which recommends movies based on the user’s profile… More >

  • Open Access

    ARTICLE

    Gaussian Optimized Deep Learning-based Belief Classification Model for Breast Cancer Detection

    Areej A. Malibari1, Marwa Obayya2, Mohamed K. Nour3, Amal S. Mehanna4, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5, Ishfaq Yaseen5, Abdelwahed Motwakel5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4123-4138, 2022, DOI:10.32604/cmc.2022.030492

    Abstract With the rapid increase of new cases with an increased mortality rate, cancer is considered the second and most deadly disease globally. Breast cancer is the most widely affected cancer worldwide, with an increased death rate percentage. Due to radiologists’ processing of mammogram images, many computer-aided diagnoses have been developed to detect breast cancer. Early detection of breast cancer will reduce the death rate worldwide. The early diagnosis of breast cancer using the developed computer-aided diagnosis (CAD) systems still needed to be enhanced by incorporating innovative deep learning technologies to improve the accuracy and sensitivity of the detection system with… More >

  • Open Access

    ARTICLE

    Optimal Cooperative Spectrum Sensing Based on Butterfly Optimization Algorithm

    Noor Gul1,2, Saeed Ahmed1,3, Atif Elahi4, Su Min Kim1, Junsu Kim1,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 369-387, 2022, DOI:10.32604/cmc.2022.022260

    Abstract Since the introduction of the Internet of Things (IoT), several researchers have been exploring its productivity to utilize and organize the spectrum assets. Cognitive radio (CR) technology is characterized as the best aspirant for wireless communications to augment IoT competencies. In the CR networks, secondary users (SUs) opportunistically get access to the primary users (PUs) spectrum through spectrum sensing. The multipath issues in the wireless channel can fluster the sensing ability of the individual SUs. Therefore, several cooperative SUs are engaged in cooperative spectrum sensing (CSS) to ensure reliable sensing results. In CSS, security is still a major concern for… More >

  • Open Access

    ARTICLE

    A Transfer Learning-Enabled Optimized Extreme Deep Learning Paradigm for Diagnosis of COVID-19

    Ahmed Reda*, Sherif Barakat, Amira Rezk

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1381-1399, 2022, DOI:10.32604/cmc.2022.019809

    Abstract Many respiratory infections around the world have been caused by coronaviruses. COVID-19 is one of the most serious coronaviruses due to its rapid spread between people and the lowest survival rate. There is a high need for computer-assisted diagnostics (CAD) in the area of artificial intelligence to help doctors and radiologists identify COVID-19 patients in cloud systems. Machine learning (ML) has been used to examine chest X-ray frames. In this paper, a new transfer learning-based optimized extreme deep learning paradigm is proposed to identify the chest X-ray picture into three classes, a pneumonia patient, a COVID-19 patient, or a normal… More >

  • Open Access

    ARTICLE

    Monarch Butterfly Optimization for Reliable Scheduling in Cloud

    B. Gomathi1, S. T. Suganthi2,*, Karthikeyan Krishnasamy3, J. Bhuvana4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3693-3710, 2021, DOI:10.32604/cmc.2021.018159

    Abstract Enterprises have extensively taken on cloud computing environment since it provides on-demand virtualized cloud application resources. The scheduling of the cloud tasks is a well-recognized NP-hard problem. The Task scheduling problem is convoluted while convincing different objectives, which are dispute in nature. In this paper, Multi-Objective Improved Monarch Butterfly Optimization (MOIMBO) algorithm is applied to solve multi-objective task scheduling problems in the cloud in preparation for Pareto optimal solutions. Three different dispute objectives, such as makespan, reliability, and resource utilization, are deliberated for task scheduling problems.The Epsilon-fuzzy dominance sort method is utilized in the multi-objective domain to elect the foremost… More >

Displaying 1-10 on page 1 of 10. Per Page