Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (329)
  • Open Access

    ARTICLE

    Semi-Supervised Clustering Algorithm Based on Deep Feature Mapping

    Xiong Xu1, Chun Zhou2,*, Chenggang Wang1, Xiaoyan Zhang2, Hua Meng2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 815-831, 2023, DOI:10.32604/iasc.2023.034656

    Abstract Clustering analysis is one of the main concerns in data mining. A common approach to the clustering process is to bring together points that are close to each other and separate points that are away from each other. Therefore, measuring the distance between sample points is crucial to the effectiveness of clustering. Filtering features by label information and measuring the distance between samples by these features is a common supervised learning method to reconstruct distance metric. However, in many application scenarios, it is very expensive to obtain a large number of labeled samples. In this paper, to solve the clustering… More >

  • Open Access

    ARTICLE

    Index-adaptive Triangle-Based Graph Local Clustering

    Zhe Yuan*, Zhewei Wei, Ji-rong Wen

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5009-5026, 2023, DOI:10.32604/cmc.2023.038531

    Abstract Motif-based graph local clustering (MGLC) algorithms are generally designed with the two-phase framework, which gets the motif weight for each edge beforehand and then conducts the local clustering algorithm on the weighted graph to output the result. Despite correctness, this framework brings limitations on both practical and theoretical aspects and is less applicable in real interactive situations. This research develops a purely local and index-adaptive method, Index-adaptive Triangle-based Graph Local Clustering (TGLC+), to solve the MGLC problem w.r.t. triangle. TGLC+ combines the approximated Monte-Carlo method Triangle-based Random Walk (TRW) and deterministic Brute-Force method Triangle-based Forward Push (TFP) adaptively to estimate… More >

  • Open Access

    ARTICLE

    A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition

    Muhammad Aamir1, Ziaur Rahman1,*, Waheed Ahmed Abro2, Uzair Aslam Bhatti3, Zaheer Ahmed Dayo1, Muhammad Ishfaq1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6351-6373, 2023, DOI:10.32604/cmc.2023.038173

    Abstract Object detection in images has been identified as a critical area of research in computer vision image processing. Research has developed several novel methods for determining an object’s location and category from an image. However, there is still room for improvement in terms of detection efficiency. This study aims to develop a technique for detecting objects in images. To enhance overall detection performance, we considered object detection a two-fold problem, including localization and classification. The proposed method generates class-independent, high-quality, and precise proposals using an agglomerative clustering technique. We then combine these proposals with the relevant input image to train… More >

  • Open Access

    ARTICLE

    Intelligent Intrusion Detection for Industrial Internet of Things Using Clustering Techniques

    Noura Alenezi, Ahamed Aljuhani*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2899-2915, 2023, DOI:10.32604/csse.2023.036657

    Abstract The rapid growth of the Internet of Things (IoT) in the industrial sector has given rise to a new term: the Industrial Internet of Things (IIoT). The IIoT is a collection of devices, apps, and services that connect physical and virtual worlds to create smart, cost-effective, and scalable systems. Although the IIoT has been implemented and incorporated into a wide range of industrial control systems, maintaining its security and privacy remains a significant concern. In the IIoT contexts, an intrusion detection system (IDS) can be an effective security solution for ensuring data confidentiality, integrity, and availability. In this paper, we… More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations between them. This problem can… More >

  • Open Access

    ARTICLE

    Quantum Cat Swarm Optimization Based Clustering with Intrusion Detection Technique for Future Internet of Things Environment

    Mohammed Basheri, Mahmoud Ragab*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3783-3798, 2023, DOI:10.32604/csse.2023.037130

    Abstract The Internet of Things (IoT) is one of the emergent technologies with advanced developments in several applications like creating smart environments, enabling Industry 4.0, etc. As IoT devices operate via an inbuilt and limited power supply, the effective utilization of available energy plays a vital role in designing the IoT environment. At the same time, the communication of IoT devices in wireless mediums poses security as a challenging issue. Recently, intrusion detection systems (IDS) have paved the way to detect the presence of intrusions in the IoT environment. With this motivation, this article introduces a novel Quantum Cat Swarm Optimization… More >

  • Open Access

    ARTICLE

    Blockchain with Explainable Artificial Intelligence Driven Intrusion Detection for Clustered IoT Driven Ubiquitous Computing System

    Reda Salama1, Mahmoud Ragab1,2,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2917-2932, 2023, DOI:10.32604/csse.2023.037016

    Abstract In the Internet of Things (IoT) based system, the multi-level client’s requirements can be fulfilled by incorporating communication technologies with distributed homogeneous networks called ubiquitous computing systems (UCS). The UCS necessitates heterogeneity, management level, and data transmission for distributed users. Simultaneously, security remains a major issue in the IoT-driven UCS. Besides, energy-limited IoT devices need an effective clustering strategy for optimal energy utilization. The recent developments of explainable artificial intelligence (XAI) concepts can be employed to effectively design intrusion detection systems (IDS) for accomplishing security in UCS. In this view, this study designs a novel Blockchain with Explainable Artificial Intelligence… More >

  • Open Access

    ARTICLE

    Adaptive Density-Based Spatial Clustering of Applications with Noise (ADBSCAN) for Clusters of Different Densities

    Ahmed Fahim1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3695-3712, 2023, DOI:10.32604/cmc.2023.036820

    Abstract Finding clusters based on density represents a significant class of clustering algorithms. These methods can discover clusters of various shapes and sizes. The most studied algorithm in this class is the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). It identifies clusters by grouping the densely connected objects into one group and discarding the noise objects. It requires two input parameters: epsilon (fixed neighborhood radius) and MinPts (the lowest number of objects in epsilon). However, it can’t handle clusters of various densities since it uses a global value for epsilon. This article proposes an adaptation of the DBSCAN method so… More >

  • Open Access

    ARTICLE

    Adaptive Noise Detector and Partition Filter for Image Restoration

    Cong Lin1, Chenghao Qiu1, Can Wu1, Siling Feng1,*, Mengxing Huang1,2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4317-4340, 2023, DOI:10.32604/cmc.2023.036249

    Abstract The random-value impulse noise (RVIN) detection approach in image denoising, which is dependent on manually defined detection thresholds or local window information, does not have strong generalization performance and cannot successfully cope with damaged pictures with high noise levels. The fusion of the K-means clustering approach in the noise detection stage is reviewed in this research, and the internal relationship between the flat region and the detail area of the damaged picture is thoroughly explored to suggest an unique two-stage method for gray image denoising. Based on the concept of pixel clustering and grouping, all pixels in the damaged picture… More >

  • Open Access

    ARTICLE

    Semantic Document Layout Analysis of Handwritten Manuscripts

    Emad Sami Jaha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2805-2831, 2023, DOI:10.32604/cmc.2023.036169

    Abstract A document layout can be more informative than merely a document’s visual and structural appearance. Thus, document layout analysis (DLA) is considered a necessary prerequisite for advanced processing and detailed document image analysis to be further used in several applications and different objectives. This research extends the traditional approaches of DLA and introduces the concept of semantic document layout analysis (SDLA) by proposing a novel framework for semantic layout analysis and characterization of handwritten manuscripts. The proposed SDLA approach enables the derivation of implicit information and semantic characteristics, which can be effectively utilized in dozens of practical applications for various… More >

Displaying 31-40 on page 4 of 329. Per Page