Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (149)
  • Open Access

    ARTICLE

    Intrusion Detection Using a New Hybrid Feature Selection Model

    Adel Hamdan Mohammad*

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 65-80, 2021, DOI:10.32604/iasc.2021.016140 - 26 July 2021

    Abstract Intrusion detection is an important topic that aims at protecting computer systems. Besides, feature selection is crucial for increasing the performance of intrusion detection. This paper employs a new hybrid feature selection model for intrusion detection. The implemented model uses Grey Wolf Optimization (GWO) and Particle Swarm Optimization (PSO) algorithms in a new manner. In addition, this study introduces two new models called (PSO-GWO-NB) and (PSO-GWO-ANN) for feature selection and intrusion detection. PSO and GWO show emergent results in feature selection for several purposes and applications. This paper uses PSO and GWO to select features… More >

  • Open Access

    ARTICLE

    An Optimized Framework for Surgical Team Selection

    Hemant Petwal*, Rinkle Rani

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2563-2582, 2021, DOI:10.32604/cmc.2021.017548 - 21 July 2021

    Abstract In the healthcare system, a surgical team is a unit of experienced personnel who provide medical care to surgical patients during surgery. Selecting a surgical team is challenging for a multispecialty hospital as the performance of its members affects the efficiency and reliability of the hospital’s patient care. The effectiveness of a surgical team depends not only on its individual members but also on the coordination among them. In this paper, we addressed the challenges of surgical team selection faced by a multispecialty hospital and proposed a decision-making framework for selecting the optimal list of… More >

  • Open Access

    ARTICLE

    An Attention Based Neural Architecture for Arrhythmia Detection and Classification from ECG Signals

    Nimmala Mangathayaru1,*, Padmaja Rani2, Vinjamuri Janaki3, Kalyanapu Srinivas4, B. Mathura Bai1, G. Sai Mohan1, B. Lalith Bharadwaj1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2425-2443, 2021, DOI:10.32604/cmc.2021.016534 - 21 July 2021

    Abstract Arrhythmia is ubiquitous worldwide and cardiologists tend to provide solutions from the recent advancements in medicine. Detecting arrhythmia from ECG signals is considered a standard approach and hence, automating this process would aid the diagnosis by providing fast, cost-efficient, and accurate solutions at scale. This is executed by extracting the definite properties from the individual patterns collected from Electrocardiography (ECG) signals causing arrhythmia. In this era of applied intelligence, automated detection and diagnostic solutions are widely used for their spontaneous and robust solutions. In this research, our contributions are two-fold. Firstly, the Dual-Tree Complex Wavelet… More >

  • Open Access

    ARTICLE

    Design and Experimentation of Causal Relationship Discovery among Features of Healthcare Datasets

    Y. Sreeraman*, S. Lakshmana Pandian

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 539-557, 2021, DOI:10.32604/iasc.2021.017256 - 16 June 2021

    Abstract Causal relationships in a data play vital role in decision making. Identification of causal association in data is one of the important areas of research in data analytics. Simple correlations between data variables reveal the degree of linear relationship. Partial correlation explains the association between two variables within the control of other related variables. Partial association test explains the causality in data. In this paper a couple of causal relationship discovery strategies are proposed using the design of partial association tree that makes use of partial association test among variables. These decision trees are different… More >

  • Open Access

    ARTICLE

    Cyclic Autoencoder for Multimodal Data Alignment Using Custom Datasets

    Zhenyu Tang1, Jin Liu1,*, Chao Yu1, Y. Ken Wang2

    Computer Systems Science and Engineering, Vol.39, No.1, pp. 37-54, 2021, DOI:10.32604/csse.2021.017230 - 10 June 2021

    Abstract The subtitle recognition under multimodal data fusion in this paper aims to recognize text lines from image and audio data. Most existing multimodal fusion methods tend to be associated with pre-fusion as well as post-fusion, which is not reasonable and difficult to interpret. We believe that fusing images and audio before the decision layer, i.e., intermediate fusion, to take advantage of the complementary multimodal data, will benefit text line recognition. To this end, we propose: (i) a novel cyclic autoencoder based on convolutional neural network. The feature dimensions of the two modal data are aligned… More >

  • Open Access

    ARTICLE

    Integrated CWT-CNN for Epilepsy Detection Using Multiclass EEG Dataset

    Sidra Naseem1, Kashif Javed1, Muhammad Jawad Khan1, Saddaf Rubab2, Muhammad Attique Khan3, Yunyoung Nam4,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 471-486, 2021, DOI:10.32604/cmc.2021.018239 - 04 June 2021

    Abstract Electroencephalography is a common clinical procedure to record brain signals generated by human activity. EEGs are useful in Brain controlled interfaces and other intelligent Neuroscience applications, but manual analysis of these brainwaves is complicated and time-consuming even for the experts of neuroscience. Various EEG analysis and classification techniques have been proposed to address this problem however, the conventional classification methods require identification and learning of specific EEG characteristics beforehand. Deep learning models can learn features from data without having in depth knowledge of data and prior feature identification. One of the great implementations of deep… More >

  • Open Access

    ARTICLE

    Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms

    Muhammad Tayyab1,*, Mohsen Marjani1, N. Z. Jhanjhi1, Ibrahim Abaker Targio Hashim2, Abdulwahab Ali Almazroi3, Abdulaleem Ali Almazroi4

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1183-1200, 2021, DOI:10.32604/cmc.2021.017199 - 04 June 2021

    Abstract Deep learning (DL) algorithms have been widely used in various security applications to enhance the performances of decision-based models. Malicious data added by an attacker can cause several security and privacy problems in the operation of DL models. The two most common active attacks are poisoning and evasion attacks, which can cause various problems, including wrong prediction and misclassification of decision-based models. Therefore, to design an efficient DL model, it is crucial to mitigate these attacks. In this regard, this study proposes a secure neural network (NN) model that provides data security during model training… More >

  • Open Access

    ARTICLE

    Suggestion Mining from Opinionated Text of Big Social Media Data

    Youseef Alotaibi1,*, Muhammad Noman Malik2, Huma Hayat Khan3, Anab Batool2, Saif ul Islam4, Abdulmajeed Alsufyani5, Saleh Alghamdi6

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3323-3338, 2021, DOI:10.32604/cmc.2021.016727 - 06 May 2021

    Abstract Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and services. The increasing availability of such big data on biased reviews and blogs creates challenges for customers and businesses in reviewing all content in their decision-making process. To overcome this challenge, extracting suggestions from opinionated text is a possible solution. In this study, the characteristics of suggestions are analyzed and a suggestion mining extraction process is presented for classifying suggestive sentences from online customers’ reviews. A classification using a word-embedding approach is used More >

  • Open Access

    ARTICLE

    Estimating Age in Short Utterances Based on Multi-Class Classification Approach

    Ameer A. Badr1,2,*, Alia K. Abdul-Hassan2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1713-1729, 2021, DOI:10.32604/cmc.2021.016732 - 13 April 2021

    Abstract Age estimation in short speech utterances finds many applications in daily life like human-robot interaction, custom call routing, targeted marketing, user-profiling, etc. Despite the comprehensive studies carried out to extract descriptive features, the estimation errors (i.e. years) are still high. In this study, an automatic system is proposed to estimate age in short speech utterances without depending on the text as well as the speaker. Firstly, four groups of features are extracted from each utterance frame using hybrid techniques and methods. After that, 10 statistical functionals are measured for each extracted feature dimension. Then, the… More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113 - 22 March 2021

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has… More >

Displaying 121-130 on page 13 of 149. Per Page