Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    Eye Detection-Based Deep Belief Neural Networks and Speeded-Up Robust Feature Algorithm

    Zahraa Tarek1, Samaa M. Shohieb1,*, Abdelghafar M. Elhady2, El-Sayed M. El-kenawy3, Mahmoud Y. Shams4

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3195-3213, 2023, DOI:10.32604/csse.2023.034092

    Abstract The ability to detect and localize the human eye is critical for use in security applications and human identification and verification systems. This is because eye recognition algorithms have multiple challenges, such as multi-pose variations, ocular parts, and illumination. Moreover, the modern security applications fail to detect facial expressions from eye images. In this paper, a Speeded-Up Roust Feature (SURF) Algorithm was utilized to localize the face images of the enrolled subjects. We highlighted on eye and pupil parts to be detected based on SURF, Hough Circle Transform (HCT), and Local Binary Pattern (LBP). Afterward, Deep Belief Neural Networks (DBNN)… More >

  • Open Access


    Adaptive Deep Learning Model for Software Bug Detection and Classification

    S. Sivapurnima*, D. Manjula

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1233-1248, 2023, DOI:10.32604/csse.2023.025991

    Abstract Software is unavoidable in software development and maintenance. In literature, many methods are discussed which fails to achieve efficient software bug detection and classification. In this paper, efficient Adaptive Deep Learning Model (ADLM) is developed for automatic duplicate bug report detection and classification process. The proposed ADLM is a combination of Conditional Random Fields decoding with Long Short-Term Memory (CRF-LSTM) and Dingo Optimizer (DO). In the CRF, the DO can be consumed to choose the efficient weight value in network. The proposed automatic bug report detection is proceeding with three stages like pre-processing, feature extraction in addition bug detection with… More >

  • Open Access


    Optimal IoT Based Improved Deep Learning Model for Medical Image Classification

    Prasanalakshmi Balaji1,*, B. Sri Revathi2, Praveetha Gobinathan3, Shermin Shamsudheen3, Thavavel Vaiyapuri4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2275-2291, 2022, DOI:10.32604/cmc.2022.028560

    Abstract Recently medical image classification plays a vital role in medical image retrieval and computer-aided diagnosis system. Despite deep learning has proved to be superior to previous approaches that depend on handcrafted features; it remains difficult to implement because of the high intra-class variance and inter-class similarity generated by the wide range of imaging modalities and clinical diseases. The Internet of Things (IoT) in healthcare systems is quickly becoming a viable alternative for delivering high-quality medical treatment in today’s e-healthcare systems. In recent years, the Internet of Things (IoT) has been identified as one of the most interesting research subjects in… More >

  • Open Access


    Decision Support System for Diagnosis of Irregular Fovea

    Ghulam Ali Mallah1, Jamil Ahmed1, Muhammad Irshad Nazeer2,*, Mazhar Ali Dootio3, Hidayatullah Shaikh1, Aadil Jameel1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5343-5353, 2022, DOI:10.32604/cmc.2022.023581

    Abstract Detection of abnormalities in human eye is one of the well-established research areas of Machine Learning. Deep Learning techniques are widely used for the diagnosis of Retinal Diseases (RD). Fovea is one of the significant parts of retina which would be prevented before the involvement of Perforated Blood Vessels (PBV). Retinopathy Images (RI) contains sufficient information to classify structural changes incurred upon PBV but Macular Features (MF) and Fovea Features (FF) are very difficult to detect because features of MF and FF could be found with Similar Color Movements (SCM) with minor variations. This paper presents novel method for the… More >

  • Open Access


    Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing

    A. S. Anakath1,*, R. Kannadasan2, Niju P. Joseph3, P. Boominathan4, G. R. Sreekanth5

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 479-492, 2022, DOI:10.32604/csse.2022.019940

    Abstract Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider in the network, they will… More >

Displaying 1-10 on page 1 of 5. Per Page  

Share Link