Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (166)
  • Open Access

    ARTICLE

    Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics

    M. Priyadharsini1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2187-2205, 2023, DOI:10.32604/csse.2023.031115

    Abstract Big Data applications face different types of complexities in classifications. Cleaning and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed data. The existing scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. Recently ensemble methods have made a mark in classification tasks as combine multiple results into a single representation. When comparing to a single model, this technique offers for improved prediction. Ensemble based feature selections parallel multiple expert’s judgments on a… More >

  • Open Access

    ARTICLE

    Cross-Validation Convolution Neural Network-Based Algorithm for Automated Detection of Diabetic Retinopathy

    S. Sudha*, A. Srinivasan, T. Gayathri Devi

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1985-2000, 2023, DOI:10.32604/csse.2023.030960

    Abstract The substantial vision loss due to Diabetic Retinopathy (DR) mainly damages the blood vessels of the retina. These feature changes in the blood vessels fail to exist any manifestation in the eye at its initial stage, if this problem doesn’t exhibit initially, that leads to permanent blindness. So, this type of disorder can be only screened and identified through the processing of fundus images. The different stages in DR are Micro aneurysms (Ma), Hemorrhages (HE), and Exudates, and the stages in lesion show the chance of DR. For the advancement of early detection of DR in the eye we have… More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper throated optimizer (DTO) to improve… More >

  • Open Access

    ARTICLE

    Age and Gender Classification Using Backpropagation and Bagging Algorithms

    Ammar Almomani1,2,*, Mohammed Alweshah3, Waleed Alomoush4, Mohammad Alauthman5, Aseel Jabai2, Anwar Abbass2, Ghufran Hamad2, Meral Abdalla2, Brij B. Gupta1,6,7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3045-3062, 2023, DOI:10.32604/cmc.2023.030567

    Abstract Voice classification is important in creating more intelligent systems that help with student exams, identifying criminals, and security systems. The main aim of the research is to develop a system able to predicate and classify gender, age, and accent. So, a new system called Classifying Voice Gender, Age, and Accent (CVGAA) is proposed. Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories. It has high precision compared to other algorithms used in this problem, as the adaptive… More >

  • Open Access

    ARTICLE

    Ensemble Classifier Design Based on Perturbation Binary Salp Swarm Algorithm for Classification

    Xuhui Zhu1,3, Pingfan Xia1,3, Qizhi He2,4,*, Zhiwei Ni1,3, Liping Ni1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 653-671, 2023, DOI:10.32604/cmes.2022.022985

    Abstract Multiple classifier system exhibits strong classification capacity compared with single classifiers, but they require significant computational resources. Selective ensemble system aims to attain equivalent or better classification accuracy with fewer classifiers. However, current methods fail to identify precise solutions for constructing an ensemble classifier. In this study, we propose an ensemble classifier design technique based on the perturbation binary salp swarm algorithm (ECDPB). Considering that extreme learning machines (ELMs) have rapid learning rates and good generalization ability, they can serve as the basic classifier for creating multiple candidates while using fewer computational resources. Meanwhile, we introduce a combined diversity measure… More >

  • Open Access

    ARTICLE

    Night Vision Object Tracking System Using Correlation Aware LSTM-Based Modified Yolo Algorithm

    R. Anandha Murugan1,*, B. Sathyabama2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 353-368, 2023, DOI:10.32604/iasc.2023.032355

    Abstract Improved picture quality is critical to the effectiveness of object recognition and tracking. The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions, such as mist, fog, dust etc. The pictures then shift in intensity, colour, polarity and consistency. A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient environments. In recent years, target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of computer performance capabilities. However, the… More >

  • Open Access

    ARTICLE

    Impact of Portable Executable Header Features on Malware Detection Accuracy

    Hasan H. Al-Khshali1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 153-178, 2023, DOI:10.32604/cmc.2023.032182

    Abstract One aspect of cybersecurity, incorporates the study of Portable Executables (PE) files maleficence. Artificial Intelligence (AI) can be employed in such studies, since AI has the ability to discriminate benign from malicious files. In this study, an exclusive set of 29 features was collected from trusted implementations, this set was used as a baseline to analyze the presented work in this research. A Decision Tree (DT) and Neural Network Multi-Layer Perceptron (NN-MLPC) algorithms were utilized during this work. Both algorithms were chosen after testing a few diverse procedures. This work implements a method of subgrouping features to answer questions such… More >

  • Open Access

    ARTICLE

    Real and Altered Fingerprint Classification Based on Various Features and Classifiers

    Saif Saad Hameed, Ismail Taha Ahmed*, Omar Munthir Al Okashi

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 327-340, 2023, DOI:10.32604/cmc.2023.031622

    Abstract Biometric recognition refers to the identification of individuals through their unique behavioral features (e.g., fingerprint, face, and iris). We need distinguishing characteristics to identify people, such as fingerprints, which are world-renowned as the most reliable method to identify people. The recognition of fingerprints has become a standard procedure in forensics, and different techniques are available for this purpose. Most current techniques lack interest in image enhancement and rely on high-dimensional features to generate classification models. Therefore, we proposed an effective fingerprint classification method for classifying the fingerprint image as authentic or altered since criminals and hackers routinely change their fingerprints… More >

  • Open Access

    ARTICLE

    Tracking and Analysis of Pedestrian’s Behavior in Public Places

    Mahwish Pervaiz1, Mohammad Shorfuzzaman2, Abdulmajeed Alsufyani2, Ahmad Jalal3, Suliman A. Alsuhibany4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 841-853, 2023, DOI:10.32604/cmc.2023.029629

    Abstract Crowd management becomes a global concern due to increased population in urban areas. Better management of pedestrians leads to improved use of public places. Behavior of pedestrian’s is a major factor of crowd management in public places. There are multiple applications available in this area but the challenge is open due to complexity of crowd and depends on the environment. In this paper, we have proposed a new method for pedestrian’s behavior detection. Kalman filter has been used to detect pedestrian’s using movement based approach. Next, we have performed occlusion detection and removal using region shrinking method to isolate occluded… More >

  • Open Access

    ARTICLE

    Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance

    Sandeep Kumar1, MohdAnul Haq2, Arpit Jain3, C. Andy Jason4, Nageswara Rao Moparthi1, Nitin Mittal5, Zamil S. Alzamil2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1523-1540, 2023, DOI:10.32604/cmc.2023.028631

    Abstract Day by day, biometric-based systems play a vital role in our daily lives. This paper proposed an intelligent assistant intended to identify emotions via voice message. A biometric system has been developed to detect human emotions based on voice recognition and control a few electronic peripherals for alert actions. This proposed smart assistant aims to provide a support to the people through buzzer and light emitting diodes (LED) alert signals and it also keep track of the places like households, hospitals and remote areas, etc. The proposed approach is able to detect seven emotions: worry, surprise, neutral, sadness, happiness, hate… More >

Displaying 51-60 on page 6 of 166. Per Page