Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,580)
  • Open Access

    ARTICLE

    An Efficient False-Positive Reduction System for Cerebral Microbleeds Detection

    Sitara Afzal1, Muazzam Maqsood1,*, Irfan Mehmood2, Muhammad Tabish Niaz3, Sanghyun Seo4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2301-2315, 2021, DOI:10.32604/cmc.2021.013966

    Abstract Cerebral Microbleeds (CMBs) are microhemorrhages caused by certain abnormalities of brain vessels. CMBs can be found in people with Traumatic Brain Injury (TBI), Alzheimer’s disease, and in old individuals having a brain injury. Current research reveals that CMBs can be highly dangerous for individuals having dementia and stroke. The CMBs seriously impact individuals’ life which makes it crucial to recognize the CMBs in its initial phase to stop deterioration and to assist individuals to have a normal life. The existing work report good results but often ignores false-positive’s perspective for this research area. In this paper, an efficient approach is… More >

  • Open Access

    ARTICLE

    Robust Attack Detection Approach for IIoT Using Ensemble Classifier

    V. Priya1, I. Sumaiya Thaseen1, Thippa Reddy Gadekallu1, Mohamed K. Aboudaif2,*, Emad Abouel Nasr3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2457-2470, 2021, DOI:10.32604/cmc.2021.013852

    Abstract Generally, the risks associated with malicious threats are increasing for the Internet of Things (IoT) and its related applications due to dependency on the Internet and the minimal resource availability of IoT devices. Thus, anomaly-based intrusion detection models for IoT networks are vital. Distinct detection methodologies need to be developed for the Industrial Internet of Things (IIoT) network as threat detection is a significant expectation of stakeholders. Machine learning approaches are considered to be evolving techniques that learn with experience, and such approaches have resulted in superior performance in various applications, such as pattern recognition, outlier analysis, and speech recognition.… More >

  • Open Access

    ARTICLE

    Multi-Level Fusion in Ultrasound for Cancer Detection Based on Uniform LBP Features

    Diyar Qader Zeebaree1, Adnan Mohsin Abdulazeez2, Dilovan Asaad Zebari3,*, Habibollah Haron4, Haza Nuzly Abdull Hamed4

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 3363-3382, 2021, DOI:10.32604/cmc.2021.013314

    Abstract Collective improvement in the acceptable or desirable accuracy level of breast cancer image-related pattern recognition using various schemes remains challenging. Despite the combination of multiple schemes to achieve superior ultrasound image pattern recognition by reducing the speckle noise, an enhanced technique is not achieved. The purpose of this study is to introduce a features-based fusion scheme based on enhancement uniform-Local Binary Pattern (LBP) and filtered noise reduction. To surmount the above limitations and achieve the aim of the study, a new descriptor that enhances the LBP features based on the new threshold has been proposed. This paper proposes a multi-level… More >

  • Open Access

    ARTICLE

    Deep Learning Based Optimal Multimodal Fusion Framework for Intrusion Detection Systems for Healthcare Data

    Phong Thanh Nguyen1, Vy Dang Bich Huynh2, Khoa Dang Vo1, Phuong Thanh Phan1, Mohamed Elhoseny3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2555-2571, 2021, DOI:10.32604/cmc.2021.012941

    Abstract Data fusion is a multidisciplinary research area that involves different domains. It is used to attain minimum detection error probability and maximum reliability with the help of data retrieved from multiple healthcare sources. The generation of huge quantity of data from medical devices resulted in the formation of big data during which data fusion techniques become essential. Securing medical data is a crucial issue of exponentially-pacing computing world and can be achieved by Intrusion Detection Systems (IDS). In this regard, since singular-modality is not adequate to attain high detection rate, there is a need exists to merge diverse techniques using… More >

  • Open Access

    REVIEW

    Detection and Grading of Diabetic Retinopathy in Retinal Images Using Deep Intelligent Systems: A Comprehensive Review

    H. Asha Gnana Priya1, J. Anitha1, Daniela Elena Popescu2, Anju Asokan1, D. Jude Hemanth1, Le Hoang Son3,4,*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2771-2786, 2021, DOI:10.32604/cmc.2021.012907

    Abstract Diabetic Retinopathy (DR) is an eye disease that mainly affects people with diabetes. People affected by DR start losing their vision from an early stage even though the symptoms are identified only at the later stage. Once the vision is lost, it cannot be regained but can be prevented from causing any further damage. Early diagnosis of DR is required for preventing vision loss, for which a trained ophthalmologist is required. The clinical practice is time-consuming and is not much successful in identifying DR at early stages. Hence, Computer-Aided Diagnosis (CAD) system is a suitable alternative for screening and grading… More >

  • Open Access

    ARTICLE

    Experimental Evaluation of Clickbait Detection Using Machine Learning Models

    Iftikhar Ahmad1,*, Mohammed A. Alqarni2, Abdulwahab Ali Almazroi3, Abdullah Tariq1

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1335-1344, 2020, DOI:10.32604/iasc.2020.013861

    Abstract The exponential growth of social media has been instrumental in directing the news outlets to rely on the stated platform for the dissemination of news stories. While social media has helped in the fast propagation of breaking news, it also has allowed many bad actors to exploit this medium for political and monetary purposes. With such an intention, tempting headlines, which are not aligned with the content, are being used to lure users to visit the websites that often post dodgy and unreliable information. This phenomenon is commonly known as clickbait. A number of machine learning techniques have been developed… More >

  • Open Access

    ARTICLE

    Feature Point Detection for Repacked Android Apps

    M. A. Rahim Khan*, Manoj Kumar Jain

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1359-1373, 2020, DOI:10.32604/iasc.2020.013849

    Abstract Repacked mobile applications and obfuscation attacks constitute a significant threat to the Android technological ecosystem. A novel method using the Constant Key Point Selection and Limited Binary Pattern Feature (CKPS: LBP) extraction-based Hashing has been proposed to identify repacked Android applications in previous works. Although the approach was efficient in detecting the repacked Android apps, it was not suitable for detecting obfuscation attacks. Additionally, the time complexity needed improvement. This paper presents an optimization technique using Scalable Bivariant Feature Transformation extract optimum feature-points extraction, and the Harris method applied for optimized image hashing. The experiments produced better results than the… More >

  • Open Access

    ARTICLE

    Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

    Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3, Mokhtar M. Ghilan2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1267-1283, 2020, DOI:10.32604/iasc.2020.013782

    Abstract In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect… More >

  • Open Access

    ARTICLE

    Spam Detection in Reviews Using LSTM-Based Multi-Entity Temporal Features

    Lingyun Xiang1,2,3, Guoqing Guo2, Qian Li4, Chengzhang Zhu5,*, Jiuren Chen6, Haoliang Ma2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1375-1390, 2020, DOI:10.32604/iasc.2020.013382

    Abstract Current works on spam detection in product reviews tend to ignore the temporal relevance among reviews in the user or product entity, resulting in poor detection performance. To address this issue, the present paper proposes a spam detection method that jointly learns comprehensive temporal features from both behavioral and text features in user and product entities. We first extract the behavioral features of a single review, then employ a convolutional neural network (CNN) to learn the text features of this review. We next combine the behavioral features with the text features of each review and train a Long-Short-Term Memory (LSTM)… More >

  • Open Access

    ARTICLE

    Text Detection and Classification from Low Quality Natural Images

    Ujala Yasmeen1, Jamal Hussain Shah1, Muhammad Attique Khan2, Ghulam Jillani Ansari1, Saeed ur Rehman1, Muhammad Sharif1, Seifedine Kadry3, Yunyoung Nam4,*

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1251-1266, 2020, DOI:10.32604/iasc.2020.012775

    Abstract Detection of textual data from scene text images is a very thought-provoking issue in the field of computer graphics and visualization. This challenge is even more complicated when edge intelligent devices are involved in the process. The low-quality image having challenges such as blur, low resolution, and contrast make it more difficult for text detection and classification. Therefore, such exigent aspect is considered in the study. The technology proposed is comprised of three main contributions. (a) After synthetic blurring, the blurred image is preprocessed, and then the deblurring process is applied to recover the image. (b) Subsequently, the standard maximal… More >

Displaying 1311-1320 on page 132 of 1580. Per Page