Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (329)
  • Open Access

    ARTICLE

    A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

    Youseef Alotaibi*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1879-1895, 2021, DOI:10.32604/cmc.2020.013739

    Abstract A new secured database management system architecture using intrusion detection systems (IDS) is proposed in this paper for organizations with no previous role mapping for users. A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm. A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’ profiles. Then, queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious. The IDS will stop query execution or… More >

  • Open Access

    ARTICLE

    Urdu Ligature Recognition System: An Evolutionary Approach

    Naila Habib Khan1,*, Awais Adnan1, Abdul Waheed2,3, Mahdi Zareei4, Abdallah Aldosary5, Ehab Mahmoud Mohamed6,7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1347-1367, 2021, DOI:10.32604/cmc.2020.013715

    Abstract Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex characteristics. Evolutionary approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks, reporting exceptional results. The proposed Urdu ligature recognition system uses a genetic algorithm for optimization and recognition. Overall the proposed recognition system observes the processes of pre-processing, segmentation, feature extraction, hierarchical clustering, classification rules and genetic algorithm optimization and recognition. The pre-processing stage removes noise from the sentence images, whereas, in segmentation, the sentences are segmented into ligature components. Fifteen features… More >

  • Open Access

    ARTICLE

    Is Social Distancing, and Quarantine Effective in Restricting COVID-19 Outbreak? Statistical Evidences from Wuhan, China

    Salman A. Cheema1, Tanveer Kifayat2, Abdu R. Rahman2, Umair Khan3, A. Zaib4, Ilyas Khan5,*, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1977-1985, 2021, DOI:10.32604/cmc.2020.012096

    Abstract The flow of novel coronavirus (COVID-19) has affected almost every aspect of human life around the globe. Being the emerging ground and early sufferer of the virus, Wuhan city-data remains a case of multifold significance. Further, it is of notable importance to explore the impact of unique and unprecedented public health response of Chinese authorities—the extreme lockdown of the city. In this research, we investigate the statistical nature of the viral transmission concerning social distancing, extreme quarantine, and robust lockdown interventions. We observed highly convincing and statistically significant evidences in favor of quarantine and social distancing approaches. These findings might… More >

  • Open Access

    ARTICLE

    A New Mixed Clustering-Based Method to Analyze the Gait of Children with Cerebral Palsy

    Jing Hu1, Ling Zhang1, Jie Li2,3,*, Qirun Wang4

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1551-1562, 2021, DOI:10.32604/cmc.2020.011829

    Abstract Cerebral palsy is a group of persistent central movement and postural developmental disorders, and restricted activity syndromes. This syndrome is caused by non-progressive brain damage to the developing fetus or infants. Cerebral palsy assessment can determine whether the brain is behind or abnormal. If it exists, early intervention and rehabilitation can be carried out as soon as possible to restore brain function to the greatest extent. The direct external manifestation of cerebral palsy is abnormal gait. Accurately determining the muscle strength-related reasons that cause this abnormal gait is the primary problem for treatment. In this paper, clustering methods were used… More >

  • Open Access

    ARTICLE

    A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network

    Gundala Swathi*

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 335-345, 2020, DOI:10.32604/csse.2020.35.335

    Abstract Researches in wireless mobile ad hoc networks have an inherent challenge of vulnerable diagnosis due to the diverse behaviour pattern of the vulnerable nodes causing heterogeneous vtype1, vtype2, vtupe3 and vtype4 faults. This paper proposes a protocol for the diagnosis of vulnerability nodes with threephases of clustering, vulnerable detection and vulnerable fault classification in wireless networks. This protocol employs the technique of probabilistic neural network for classification of vulnerable nodes and detects vulnerable nodes through timeout mechanism and vtype3, vtype4, vtype1, vtype2 nodes through the method of analysis variance. Network simulator NS-2.3.35 is employed for performance evaluation of the protocol. More >

  • Open Access

    ARTICLE

    Weighted Particle Swarm Clustering Algorithm for Self-Organizing Maps

    Guorong Cui, Hao Li, Yachuan Zhang, Rongjing Bu, Yan Kang*, Jinyuan Li, Yang Hu

    Journal of Quantum Computing, Vol.2, No.2, pp. 85-95, 2020, DOI:10.32604/jqc.2020.09717

    Abstract The traditional K-means clustering algorithm is difficult to determine the cluster number, which is sensitive to the initialization of the clustering center and easy to fall into local optimum. This paper proposes a clustering algorithm based on self-organizing mapping network and weight particle swarm optimization SOM&WPSO (Self-Organization Map and Weight Particle Swarm Optimization). Firstly, the algorithm takes the competitive learning mechanism of a self-organizing mapping network to divide the data samples into coarse clusters and obtain the clustering center. Then, the obtained clustering center is used as the initialization parameter of the weight particle swarm optimization algorithm. The particle position… More >

  • Open Access

    ARTICLE

    Hybridization of Fuzzy and Hard Semi-Supervised Clustering Algorithms Tuned with Ant Lion Optimizer Applied to Higgs Boson Search

    Soukaina Mjahed1,*, Khadija Bouzaachane1, Ahmad Taher Azar2,3, Salah El Hadaj1, Said Raghay1

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 459-494, 2020, DOI:10.32604/cmes.2020.010791

    Abstract This paper focuses on the unsupervised detection of the Higgs boson particle using the most informative features and variables which characterize the “Higgs machine learning challenge 2014” data set. This unsupervised detection goes in this paper analysis through 4 steps: (1) selection of the most informative features from the considered data; (2) definition of the number of clusters based on the elbow criterion. The experimental results showed that the optimal number of clusters that group the considered data in an unsupervised manner corresponds to 2 clusters; (3) proposition of a new approach for hybridization of both hard and fuzzy clustering… More >

  • Open Access

    ARTICLE

    The Application of Sparse Reconstruction Algorithm for Improving Background Dictionary in Visual Saliency Detection

    Lei Feng1,2, Haibin Li1,*, Yakun Gao1, Yakun Zhang1

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 831-839, 2020, DOI:10.32604/iasc.2020.010117

    Abstract In the paper, we apply the sparse reconstruction algorithm of improved background dictionary to saliency detection. Firstly, after super-pixel segmentation, two bottom features are extracted: the color information of LAB and the texture features of the image by Gabor filter. Secondly, the convex hull theory is used to remove object region in boundary region, and K-means clustering algorithm is used to continue to simplify the background dictionary. Finally, the saliency map is obtained by calculating the reconstruction error. Compared with the mainstream algorithms, the accuracy and efficiency of this algorithm are better than those of other algorithms. More >

  • Open Access

    ARTICLE

    Detection of the Spectrum Hole from N-number of Primary Users Using the Gencluster Algorithm

    U. Venkateshkumar1,*, S. Ramakrishnan2

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 817-830, 2020, DOI:10.32604/iasc.2020.010116

    Abstract A hybrid form of the genetic algorithm and the modified K-Means cluster algorithm forms as a Gencluster to detect a spectrum hole among n-number of primary users (PUs) is present in the cooperative spectrum sensing model. The fusion center (FC), applies the genetic algorithm to identify the best chromosome, which contains many PUs cluster centers and by applying the modified K-Means cluster algorithm identifies the cluster with the PU vacant spectrum showing high accuracy, and maximum probability of detection with minimum false alarm rates are achieved. The graphical representation of the performance metric of the system model shows 95% accuracy… More >

  • Open Access

    ARTICLE

    Reducing Operational Time Complexity of k-NN Algorithms Using Clustering in Wrist-Activity Recognition

    Sun-Taag Choe, We-Duke Cho*, Jai-Hoon Kim, and Ki-Hyung Kim

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 679-691, 2020, DOI:10.32604/iasc.2020.010102

    Abstract Recent research on activity recognition in wearable devices has identified a key challenge: k-nearest neighbors (k-NN) algorithms have a high operational time complexity. Thus, these algorithms are difficult to utilize in embedded wearable devices. Herein, we propose a method for reducing this complexity. We apply a clustering algorithm for learning data and assign labels to each cluster according to the maximum likelihood. Experimental results show that the proposed method achieves effective operational levels for implementation in embedded devices; however, the accuracy is slightly lower than that of a traditional k-NN algorithm. Additionally, our method provides the advantage of controlling the… More >

Displaying 271-280 on page 28 of 329. Per Page