Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (61)
  • Open Access

    ARTICLE

    Evolutionary Algorithsm with Machine Learning Based Epileptic Seizure Detection Model

    Manar Ahmed Hamza1,*, Noha Negm2, Shaha Al-Otaibi3, Amel A. Alhussan4, Mesfer Al Duhayyim5, Fuad Ali Mohammed Al-Yarimi2, Mohammed Rizwanullah1, Ishfaq Yaseen1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4541-4555, 2022, DOI:10.32604/cmc.2022.027048 - 21 April 2022

    Abstract Machine learning (ML) becomes a familiar topic among decision makers in several domains, particularly healthcare. Effective design of ML models assists to detect and classify the occurrence of diseases using healthcare data. Besides, the parameter tuning of the ML models is also essential to accomplish effective classification results. This article develops a novel red colobuses monkey optimization with kernel extreme learning machine (RCMO-KELM) technique for epileptic seizure detection and classification. The proposed RCMO-KELM technique initially extracts the chaotic, time, and frequency domain features in the actual EEG signals. In addition, the min-max normalization approach is More >

  • Open Access

    ARTICLE

    Printed Surface Defect Detection Model Based on Positive Samples

    Xin Zihao1, Wang Hongyuan1,*, Qi Pengyu1, Du Weidong2, Zhang Ji1, Chen Fuhua3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5925-5938, 2022, DOI:10.32604/cmc.2022.026943 - 21 April 2022

    Abstract For a long time, the detection and extraction of printed surface defects has been a hot issue in the print industry. Nowadays, defect detection of a large number of products still relies on traditional image processing algorithms such as scale invariant feature transform (SIFT) and oriented fast and rotated brief (ORB), and researchers need to design algorithms for specific products. At present, a large number of defect detection algorithms based on object detection have been applied but need lots of labeling samples with defects. Besides, there are many kinds of defects in printed surface, so… More >

  • Open Access

    ARTICLE

    Fruits and Vegetables Freshness Categorization Using Deep Learning

    Labiba Gillani Fahad1, Syed Fahad Tahir2,*, Usama Rasheed1, Hafsa Saqib1, Mehdi Hassan2, Hani Alquhayz3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5083-5098, 2022, DOI:10.32604/cmc.2022.023357 - 14 January 2022

    Abstract The nutritional value of perishable food items, such as fruits and vegetables, depends on their freshness levels. The existing approaches solve a binary class problem by classifying a known fruit\vegetable class into fresh or rotten only. We propose an automated fruits and vegetables categorization approach that first recognizes the class of object in an image and then categorizes that fruit or vegetable into one of the three categories: pure-fresh, medium-fresh, and rotten. We gathered a dataset comprising of 60K images of 11 fruits and vegetables, each is further divided into three categories of freshness, using… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Based Automated Fish Detection Model for UWSN

    Mesfer Al Duhayyim1, Haya Mesfer Alshahrani2, Fahd N. Al-Wesabi3, Mohammed Alamgeer4, Anwer Mustafa Hilal5,*, Manar Ahmed Hamza5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5871-5887, 2022, DOI:10.32604/cmc.2022.021093 - 11 October 2021

    Abstract An exponential growth in advanced technologies has resulted in the exploration of Ocean spaces. It has paved the way for new opportunities that can address questions relevant to diversity, uniqueness, and difficulty of marine life. Underwater Wireless Sensor Networks (UWSNs) are widely used to leverage such opportunities while these networks include a set of vehicles and sensors to monitor the environmental conditions. In this scenario, it is fascinating to design an automated fish detection technique with the help of underwater videos and computer vision techniques so as to estimate and monitor fish biomass in water… More >

  • Open Access

    ARTICLE

    Rule-Based Anomaly Detection Model with Stateful Correlation Enhancing Mobile Network Security

    Rafia Afzal, Raja Kumar Murugesan*

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1825-1841, 2022, DOI:10.32604/iasc.2022.020598 - 09 October 2021

    Abstract The global Signalling System No. 7 (SS7) network protocol standard has been developed and regulated based only on trusted partner networks. The SS7 network protocol by design neither secures the communication channel nor verifies the entire network peers. The SS7 network protocol used in telecommunications has deficiencies that include verification of actual subscribers, precise location, subscriber’s belonging to a network, absence of illegitimate message filtering mechanism, and configuration deficiencies in home routing networks. Attackers can take advantage of these deficiencies and exploit them to impose threats such as subscriber or network data disclosure, intercept mobile… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Based Rice Plant Disease Detection Model

    R. P. Narmadha1,*, N. Sengottaiyan2, R. J. Kavitha3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1257-1271, 2022, DOI:10.32604/iasc.2022.020679 - 22 September 2021

    Abstract In agriculture, plant diseases are mainly accountable for reduction in productivity and leads to huge economic loss. Rice is the essential food crop in Asian countries and it gets easily affected by different kinds of diseases. Because of the advent of computer vision and deep learning (DL) techniques, the rice plant diseases can be detected and reduce the burden of the farmers to save the crops. To achieve this, a new DL based rice plant disease diagnosis is developed using Densely Convolution Neural Network (DenseNet) with multilayer perceptron (MLP), called DenseNet169-MLP. The proposed model aims… More >

  • Open Access

    ARTICLE

    A Hybrid Intrusion Detection Model Based on Spatiotemporal Features

    Linbei Wang1 , Zaoyu Tao1, Lina Wang2,*, Yongjun Ren3

    Journal of Quantum Computing, Vol.3, No.3, pp. 107-118, 2021, DOI:10.32604/jqc.2021.016857 - 21 December 2021

    Abstract With the accelerating process of social informatization, our personal information security and Internet sites, etc., have been facing a series of threats and challenges. Recently, well-developed neural network has seen great advancement in natural language processing and computer vision, which is also adopted in intrusion detection. In this research, a hybrid model integrating MultiScale Convolutional Neural Network and Long Short-term Memory Network (MSCNN-LSTM) is designed to conduct the intrusion detection. Multi-Scale Convolutional Neural Network (MSCNN) is used to extract the spatial characteristics of data sets. And Long Short-term Memory Network (LSTM) is responsible for processing More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Intrusion Detection Model for Fog Computing Environment

    K. Kalaivani*, M. Chinnadurai

    Intelligent Automation & Soft Computing, Vol.30, No.1, pp. 1-15, 2021, DOI:10.32604/iasc.2021.017515 - 26 July 2021

    Abstract Fog computing extends the concept of cloud computing by providing the services of computing, storage, and networking connectivity at the edge between data centers in cloud computing environments and end devices. Having the intelligence at the edge enables faster real-time decision-making and reduces the amount of data forwarded to the cloud. When enhanced by fog computing, the Internet of Things (IoT) brings low latency and improves real time and quality of service (QoS) in IoT applications of augmented reality, smart grids, smart vehicles, and healthcare. However, both cloud and fog computing environments are vulnerable to… More >

  • Open Access

    ARTICLE

    Deep Learning and Entity Embedding-Based Intrusion Detection Model for Wireless Sensor Networks

    Bandar Almaslukh*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1343-1360, 2021, DOI:10.32604/cmc.2021.017914 - 04 June 2021

    Abstract Wireless sensor networks (WSNs) are considered promising for applications such as military surveillance and healthcare. The security of these networks must be ensured in order to have reliable applications. Securing such networks requires more attention, as they typically implement no dedicated security appliance. In addition, the sensors have limited computing resources and power and storage, which makes WSNs vulnerable to various attacks, especially denial of service (DoS). The main types of DoS attacks against WSNs are blackhole, grayhole, flooding, and scheduling. There are two primary techniques to build an intrusion detection system (IDS): signature-based and… More >

  • Open Access

    ARTICLE

    A New Segmentation Framework for Arabic Handwritten Text Using Machine Learning Techniques

    Saleem Ibraheem Saleem1,*, Adnan Mohsin Abdulazeez1, Zeynep Orman2

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2727-2754, 2021, DOI:10.32604/cmc.2021.016447 - 13 April 2021

    Abstract The writer identification (WI) of handwritten Arabic text is now of great concern to intelligence agencies following the recent attacks perpetrated by known Middle East terrorist organizations. It is also a useful instrument for the digitalization and attribution of old text to other authors of historic studies, including old national and religious archives. In this study, we proposed a new affective segmentation model by modifying an artificial neural network model and making it suitable for the binarization stage based on blocks. This modified method is combined with a new effective rotation model to achieve an… More >

Displaying 41-50 on page 5 of 61. Per Page