Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,170)
  • Open Access

    ARTICLE

    SNR and RSSI Based an Optimized Machine Learning Based Indoor Localization Approach: Multistory Round Building Scenario over LoRa Network

    Muhammad Ayoub Kamal1,3, Muhammad Mansoor Alam1,2,4,6, Aznida Abu Bakar Sajak1, Mazliham Mohd Su’ud2,5,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1927-1945, 2024, DOI:10.32604/cmc.2024.052169 - 15 August 2024

    Abstract In situations when the precise position of a machine is unknown, localization becomes crucial. This research focuses on improving the position prediction accuracy over long-range (LoRa) network using an optimized machine learning-based technique. In order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology, this study proposed an optimized machine learning (ML) based algorithm. Received signal strength indicator (RSSI) data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout building. The More >

  • Open Access

    ARTICLE

    Improving the Effectiveness of Image Classification Structural Methods by Compressing the Description According to the Information Content Criterion

    Yousef Ibrahim Daradkeh1,*, Volodymyr Gorokhovatskyi2, Iryna Tvoroshenko2,*, Medien Zeghid1,3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3085-3106, 2024, DOI:10.32604/cmc.2024.051709 - 15 August 2024

    Abstract The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors. The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency. The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations. It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.… More >

  • Open Access

    ARTICLE

    HybridGAD: Identification of AI-Generated Radiology Abstracts Based on a Novel Hybrid Model with Attention Mechanism

    Tuğba Çelikten1, Aytuğ Onan2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3351-3377, 2024, DOI:10.32604/cmc.2024.051574 - 15 August 2024

    Abstract The purpose of this study is to develop a reliable method for distinguishing between AI-generated, paraphrased, and human-written texts, which is crucial for maintaining the integrity of research and ensuring accurate information flow in critical fields such as healthcare. To achieve this, we propose HybridGAD, a novel hybrid model that combines Long Short-Term Memory (LSTM), Bidirectional LSTM (Bi-LSTM), and Bidirectional Gated Recurrent Unit (Bi-GRU) architectures with an attention mechanism. Our methodology involves training this hybrid model on a dataset of radiology abstracts, encompassing texts generated by AI, paraphrased by AI, and written by humans. The… More >

  • Open Access

    ARTICLE

    Enhancing Mild Cognitive Impairment Detection through Efficient Magnetic Resonance Image Analysis

    Atif Mehmood1,2, Zhonglong Zheng1,*, Rizwan Khan1, Ahmad Al Smadi3, Farah Shahid1,2, Shahid Iqbal4, Mutasem K. Alsmadi5, Yazeed Yasin Ghadi6, Syed Aziz Shah8, Mostafa M. Ibrahim7

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2081-2098, 2024, DOI:10.32604/cmc.2024.046869 - 15 August 2024

    Abstract Neuroimaging has emerged over the last few decades as a crucial tool in diagnosing Alzheimer’s disease (AD). Mild cognitive impairment (MCI) is a condition that falls between the spectrum of normal cognitive function and AD. However, previous studies have mainly used handcrafted features to classify MCI, AD, and normal control (NC) individuals. This paper focuses on using gray matter (GM) scans obtained through magnetic resonance imaging (MRI) for the diagnosis of individuals with MCI, AD, and NC. To improve classification performance, we developed two transfer learning strategies with data augmentation (i.e., shear range, rotation, zoom… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437 - 18 July 2024

    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    YOLO-Based Damage Detection with StyleGAN3 Data Augmentation for Parcel Information-Recognition System

    Seolhee Kim1, Sang-Duck Lee2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 195-215, 2024, DOI:10.32604/cmc.2024.052070 - 18 July 2024

    Abstract Damage to parcels reduces customer satisfaction with delivery services and increases return-logistics costs. This can be prevented by detecting and addressing the damage before the parcels reach the customer. Consequently, various studies have been conducted on deep learning techniques related to the detection of parcel damage. This study proposes a deep learning-based damage detection method for various types of parcels. The method is intended to be part of a parcel information-recognition system that identifies the volume and shipping information of parcels, and determines whether they are damaged; this method is intended for use in the… More >

  • Open Access

    ARTICLE

    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 507-526, 2024, DOI:10.32604/cmc.2024.051820 - 18 July 2024

    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open Access

    ARTICLE

    A Gaussian Noise-Based Algorithm for Enhancing Backdoor Attacks

    Hong Huang, Yunfei Wang*, Guotao Yuan, Xin Li

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 361-387, 2024, DOI:10.32604/cmc.2024.051633 - 18 July 2024

    Abstract Deep Neural Networks (DNNs) are integral to various aspects of modern life, enhancing work efficiency. Nonetheless, their susceptibility to diverse attack methods, including backdoor attacks, raises security concerns. We aim to investigate backdoor attack methods for image categorization tasks, to promote the development of DNN towards higher security. Research on backdoor attacks currently faces significant challenges due to the distinct and abnormal data patterns of malicious samples, and the meticulous data screening by developers, hindering practical attack implementation. To overcome these challenges, this study proposes a Gaussian Noise-Targeted Universal Adversarial Perturbation (GN-TUAP) algorithm. This approach… More >

  • Open Access

    ARTICLE

    Pulmonary Edema and Pleural Effusion Detection Using EfficientNet-V1-B4 Architecture and AdamW Optimizer from Chest X-Rays Images

    Anas AbuKaraki1, Tawfi Alrawashdeh1, Sumaya Abusaleh1, Malek Zakarya Alksasbeh1,*, Bilal Alqudah1, Khalid Alemerien2, Hamzah Alshamaseen3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1055-1073, 2024, DOI:10.32604/cmc.2024.051420 - 18 July 2024

    Abstract This paper presents a novel multiclass system designed to detect pleural effusion and pulmonary edema on chest X-ray images, addressing the critical need for early detection in healthcare. A new comprehensive dataset was formed by combining 28,309 samples from the ChestX-ray14, PadChest, and CheXpert databases, with 10,287, 6022, and 12,000 samples representing Pleural Effusion, Pulmonary Edema, and Normal cases, respectively. Consequently, the preprocessing step involves applying the Contrast Limited Adaptive Histogram Equalization (CLAHE) method to boost the local contrast of the X-ray samples, then resizing the images to 380 × 380 dimensions, followed by using the data… More >

  • Open Access

    ARTICLE

    Classified VPN Network Traffic Flow Using Time Related to Artificial Neural Network

    Saad Abdalla Agaili Mohamed*, Sefer Kurnaz

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 819-841, 2024, DOI:10.32604/cmc.2024.050474 - 18 July 2024

    Abstract VPNs are vital for safeguarding communication routes in the continually changing cybersecurity world. However, increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorize VPN network data. We present a novel VPN network traffic flow classification method utilizing Artificial Neural Networks (ANN). This paper aims to provide a reliable system that can identify a virtual private network (VPN) traffic from intrusion attempts, data exfiltration, and denial-of-service assaults. We compile a broad dataset of labeled VPN traffic flows from various apps and usage patterns. Next, we create an ANN architecture that can… More >

Displaying 61-70 on page 7 of 1170. Per Page