Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (136)
  • Open Access

    ARTICLE

    Design and Experimentation of Causal Relationship Discovery among Features of Healthcare Datasets

    Y. Sreeraman*, S. Lakshmana Pandian

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 539-557, 2021, DOI:10.32604/iasc.2021.017256

    Abstract Causal relationships in a data play vital role in decision making. Identification of causal association in data is one of the important areas of research in data analytics. Simple correlations between data variables reveal the degree of linear relationship. Partial correlation explains the association between two variables within the control of other related variables. Partial association test explains the causality in data. In this paper a couple of causal relationship discovery strategies are proposed using the design of partial association tree that makes use of partial association test among variables. These decision trees are different from normal decision trees in… More >

  • Open Access

    ARTICLE

    Cyclic Autoencoder for Multimodal Data Alignment Using Custom Datasets

    Zhenyu Tang1, Jin Liu1,*, Chao Yu1, Y. Ken Wang2

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 37-54, 2021, DOI:10.32604/csse.2021.017230

    Abstract The subtitle recognition under multimodal data fusion in this paper aims to recognize text lines from image and audio data. Most existing multimodal fusion methods tend to be associated with pre-fusion as well as post-fusion, which is not reasonable and difficult to interpret. We believe that fusing images and audio before the decision layer, i.e., intermediate fusion, to take advantage of the complementary multimodal data, will benefit text line recognition. To this end, we propose: (i) a novel cyclic autoencoder based on convolutional neural network. The feature dimensions of the two modal data are aligned under the premise of stabilizing… More >

  • Open Access

    ARTICLE

    Integrated CWT-CNN for Epilepsy Detection Using Multiclass EEG Dataset

    Sidra Naseem1, Kashif Javed1, Muhammad Jawad Khan1, Saddaf Rubab2, Muhammad Attique Khan3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 471-486, 2021, DOI:10.32604/cmc.2021.018239

    Abstract Electroencephalography is a common clinical procedure to record brain signals generated by human activity. EEGs are useful in Brain controlled interfaces and other intelligent Neuroscience applications, but manual analysis of these brainwaves is complicated and time-consuming even for the experts of neuroscience. Various EEG analysis and classification techniques have been proposed to address this problem however, the conventional classification methods require identification and learning of specific EEG characteristics beforehand. Deep learning models can learn features from data without having in depth knowledge of data and prior feature identification. One of the great implementations of deep learning is Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    Muhammad Tayyab1,*, Mohsen Marjani1, N. Z. Jhanjhi1, Ibrahim Abaker Targio Hashim2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1183-1200, 2021, DOI:10.32604/cmc.2021.017199

    Abstract Deep learning (DL) algorithms have been widely used in various security applications to enhance the performances of decision-based models. Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models. The two most common active attacks are poisoning and evasion attacks, which can cause various problems, including wrong prediction and misclassification of decision-based models. Therefore, to design an efficient DL model, it is crucial to mitigate these attacks. In this regard, this study proposes a secure neural network (NN) model that provides data security during model training and testing phases. The main… More >

  • Open Access

    ARTICLE

    Suggestion Mining from Opinionated Text of Big Social Media Data

    Youseef Alotaibi1,*, Muhammad Noman Malik2, Huma Hayat Khan3, Anab Batool2, Saif ul Islam4, Abdulmajeed Alsufyani5, Saleh Alghamdi6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3323-3338, 2021, DOI:10.32604/cmc.2021.016727

    Abstract Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and services. The increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making process. To overcome this challenge, extracting suggestions from opinionated text is a possible solution. In this study, the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’ reviews. A classification using a word-embedding approach is used via the XGBoost classifier. The… More >

  • Open Access

    ARTICLE

    Estimating Age in Short Utterances Based on Multi-Class Classification Approach

    Ameer A. Badr1,2,*, Alia K. Abdul-Hassan2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1713-1729, 2021, DOI:10.32604/cmc.2021.016732

    Abstract Age estimation in short speech utterances finds many applications in daily life like human-robot interaction, custom call routing, targeted marketing, user-profiling, etc. Despite the comprehensive studies carried out to extract descriptive features, the estimation errors (i.e. years) are still high. In this study, an automatic system is proposed to estimate age in short speech utterances without depending on the text as well as the speaker. Firstly, four groups of features are extracted from each utterance frame using hybrid techniques and methods. After that, 10 statistical functionals are measured for each extracted feature dimension. Then, the extracted feature dimensions are normalized… More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has two objectives; The first one… More >

  • Open Access

    ARTICLE

    Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset

    Kang-Cheng Chen1, Chia-Mu Yu2,*, Tooska Dargahi3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 761-787, 2021, DOI:10.32604/cmc.2021.014984

    Abstract The advancement of information technology has improved the delivery of financial services by the introduction of Financial Technology (FinTech). To enhance their customer satisfaction, Fintech companies leverage artificial intelligence (AI) to collect fine-grained data about individuals, which enables them to provide more intelligent and customized services. However, although visions thereof promise to make customers’ lives easier, they also raise major security and privacy concerns for their users. Differential privacy (DP) is a common privacy-preserving data publishing technique that is proved to ensure a high level of privacy preservation. However, an important concern arises from the trade-off between the data utility… More >

  • Open Access

    ARTICLE

    Anomaly Detection in ICS Datasets with Machine Learning Algorithms

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Farah Diyana Abdul Rahman, Mohammad Tahir2

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 33-46, 2021, DOI:10.32604/csse.2021.014384

    Abstract An Intrusion Detection System (IDS) provides a front-line defense mechanism for the Industrial Control System (ICS) dedicated to keeping the process operations running continuously for 24 hours in a day and 7 days in a week. A well-known ICS is the Supervisory Control and Data Acquisition (SCADA) system. It supervises the physical process from sensor data and performs remote monitoring control and diagnostic functions in critical infrastructures. The ICS cyber threats are growing at an alarming rate on industrial automation applications. Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as… More >

  • Open Access

    ARTICLE

    Statistical Histogram Decision Based Contrast Categorization of Skin Lesion Datasets Dermoscopic Images

    Rabia Javed1,2, Mohd Shafry Mohd Rahim1, Tanzila Saba3, Suliman Mohamed Fati3, Amjad Rehman3,*, Usman Tariq4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2337-2352, 2021, DOI:10.32604/cmc.2021.014677

    Abstract Most of the melanoma cases of skin cancer are the life-threatening form of cancer. It is prevalent among the Caucasian group of people due to their light skin tone. Melanoma is the second most common cancer that hits the age group of 15–29 years. The high number of cases has increased the importance of automated systems for diagnosing. The diagnosis should be fast and accurate for the early treatment of melanoma. It should remove the need for biopsies and provide stable diagnostic results. Automation requires large quantities of images. Skin lesion datasets contain various kinds of dermoscopic images for the… More >

Displaying 111-120 on page 12 of 136. Per Page