Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    Deep Learning Approach for COVID-19 Detection in Computed Tomography Images

    Mohamad Mahmoud Al Rahhal1, Yakoub Bazi2,*, Rami M. Jomaa3, Mansour Zuair2, Naif Al Ajlan2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2093-2110, 2021, DOI:10.32604/cmc.2021.014956

    Abstract With the rapid spread of the coronavirus disease 2019 (COVID-19) worldwide, the establishment of an accurate and fast process to diagnose the disease is important. The routine real-time reverse transcription-polymerase chain reaction (rRT-PCR) test that is currently used does not provide such high accuracy or speed in the screening process. Among the good choices for an accurate and fast test to screen COVID-19 are deep learning techniques. In this study, a new convolutional neural network (CNN) framework for COVID-19 detection using computed tomography (CT) images is proposed. The EfficientNet architecture is applied as the backbone structure of the proposed network,… More >

  • Open Access

    ARTICLE

    PeachNet: Peach Diseases Detection for Automatic Harvesting

    Wael Alosaimi1,*, Hashem Alyami2, M. Irfan Uddin3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1665-1677, 2021, DOI:10.32604/cmc.2021.014950

    Abstract To meet the food requirements of the seven billion people on Earth, multiple advancements in agriculture and industry have been made. The main threat to food items is from diseases and pests which affect the quality and quantity of food. Different scientific mechanisms have been developed to protect plants and fruits from pests and diseases and to increase the quantity and quality of food. Still these mechanisms require manual efforts and human expertise to diagnose diseases. In the current decade Artificial Intelligence is used to automate different processes, including agricultural processes, such as automatic harvesting. Machine Learning techniques are becoming… More >

  • Open Access

    ARTICLE

    Role of Fuzzy Approach towards Fault Detection for Distributed Components

    Yaser Hafeez1, Sadia Ali1, Nz Jhanjhi2, Mamoona Humayun3, Anand Nayyar4,5,*, Mehedi Masud6

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1979-1996, 2021, DOI:10.32604/cmc.2021.014830

    Abstract Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment. Among other communication, teamwork, and coordination problems in global software development, the detection of faults is seen as the key challenge. Thus, there is a need to ensure the reliability of component-based applications requirements. Distributed device detection faults applied to tracked components from various sources and failed to keep track of all the large number of components from different locations. In this study, we propose an approach for fault detection from component-based systems requirements using the fuzzy logic approach and… More >

  • Open Access

    ARTICLE

    An Efficient Fuzzy Logic Fault Detection and Identification Method of Photovoltaic Inverters

    Mokhtar Aly1,2, Hegazy Rezk3,4,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.014786

    Abstract Fuzzy logic control (FLC) systems have found wide utilization in several industrial applications. This paper proposes a fuzzy logic-based fault detection and identification method for open-circuit switch fault in grid-tied photovoltaic (PV) inverters. Large installations and ambitious plans have been recently achieved for PV systems as clean and renewable power generation sources due to their improved environmental impacts and availability everywhere. Power converters represent the main parts for the grid integration of PV systems. However, PV power converters contain several power switches that construct their circuits. The power switches in PV systems are highly subjected to high stresses due to… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach for Expression Detection in Healthcare Monitoring Systems

    Muhammad Kashif1, Ayyaz Hussain2, Asim Munir1, Abdul Basit Siddiqui3, Aaqif Afzaal Abbasi4, Muhammad Aakif5, Arif Jamal Malik4, Fayez Eid Alazemi6, Oh-Young Song7,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2123-2139, 2021, DOI:10.32604/cmc.2021.014782

    Abstract Expression detection plays a vital role to determine the patient’s condition in healthcare systems. It helps the monitoring teams to respond swiftly in case of emergency. Due to the lack of suitable methods, results are often compromised in an unconstrained environment because of pose, scale, occlusion and illumination variations in the image of the face of the patient. A novel patch-based multiple local binary patterns (LBP) feature extraction technique is proposed for analyzing human behavior using facial expression recognition. It consists of three-patch [TPLBP] and four-patch LBPs [FPLBP] based feature engineering respectively. Image representation is encoded from local patch statistics… More >

  • Open Access

    ARTICLE

    M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

    Jae Dong Lee1,2, Hyo Soung Cha1, Shailendra Rathore2, Jong Hyuk Park2,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1537-1553, 2021, DOI:10.32604/cmc.2021.014774

    Abstract In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture… More >

  • Open Access

    ARTICLE

    QI-BRiCE: Quality Index for Bleeding Regions in Capsule Endoscopy Videos

    Muhammad Arslan Usman1, Muhammad Rehan Usman2, Gandeva Bayu Satrya3, Muhammad Ashfaq Khan4, Christos Politis1, Nada Philip1, Soo Young Shin5,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1697-1712, 2021, DOI:10.32604/cmc.2021.014696

    Abstract With the advent in services such as telemedicine and telesurgery, provision of continuous quality monitoring for these services has become a challenge for the network operators. Quality standards for provision of such services are application specific as medical imagery is quite different than general purpose images and videos. This paper presents a novel full reference objective video quality metric that focuses on estimating the quality of wireless capsule endoscopy (WCE) videos containing bleeding regions. Bleeding regions in gastrointestinal tract have been focused in this research, as bleeding is one of the major reasons behind several diseases within the tract. The… More >

  • Open Access

    ARTICLE

    Recognition and Detection of Diabetic Retinopathy Using Densenet-65 Based Faster-RCNN

    Saleh Albahli1, Tahira Nazir2,*, Aun Irtaza2, Ali Javed3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1333-1351, 2021, DOI:10.32604/cmc.2021.014691

    Abstract Diabetes is a metabolic disorder that results in a retinal complication called diabetic retinopathy (DR) which is one of the four main reasons for sightlessness all over the globe. DR usually has no clear symptoms before the onset, thus making disease identification a challenging task. The healthcare industry may face unfavorable consequences if the gap in identifying DR is not filled with effective automation. Thus, our objective is to develop an automatic and cost-effective method for classifying DR samples. In this work, we present a custom Faster-RCNN technique for the recognition and classification of DR lesions from retinal images. After… More >

  • Open Access

    ARTICLE

    Real-Time Anomaly Detection in Packaged Food X-Ray Images Using Supervised Learning

    Kangjik Kim1, Hyunbin Kim1, Junchul Chun1, Mingoo Kang2, Min Hong3,*, Byungseok Min4

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2547-2568, 2021, DOI:10.32604/cmc.2021.014642

    Abstract Physical contamination of food occurs when it comes into contact with foreign objects. Foreign objects can be introduced to food at any time during food delivery and packaging and can cause serious concerns such as broken teeth or choking. Therefore, a preventive method that can detect and remove foreign objects in advance is required. Several studies have attempted to detect defective products using deep learning networks. Because it is difficult to obtain foreign object-containing food data from industry, most studies on industrial anomaly detection have used unsupervised learning methods. This paper proposes a new method for real-time anomaly detection in… More >

  • Open Access

    ARTICLE

    An Effective Memory Analysis for Malware Detection and Classification

    Rami Sihwail*, Khairuddin Omar, Khairul Akram Zainol Ariffin

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2301-2320, 2021, DOI:10.32604/cmc.2021.014510

    Abstract The study of malware behaviors, over the last years, has received tremendous attention from researchers for the purpose of reducing malware risks. Most of the investigating experiments are performed using either static analysis or behavior analysis. However, recent studies have shown that both analyses are vulnerable to modern malware files that use several techniques to avoid analysis and detection. Therefore, extracted features could be meaningless and a distraction for malware analysts. However, the volatile memory can expose useful information about malware behaviors and characteristics. In addition, memory analysis is capable of detecting unconventional malware, such as in-memory and fileless malware.… More >

Displaying 1281-1290 on page 129 of 1580. Per Page