Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (231)
  • Open Access

    ARTICLE

    Intelligent Forensic Investigation Using Optimal Stacked Autoencoder for Critical Industrial Infrastructures

    Abdullah S. AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, F. J. Alsolami5, Hani Choudhry3,6, Ibrahim Rizqallah Alzahrani7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2275-2289, 2022, DOI:10.32604/cmc.2022.026226

    Abstract Industrial Control Systems (ICS) can be employed on the industrial processes in order to reduce the manual labor and handle the complicated industrial system processes as well as communicate effectively. Internet of Things (IoT) integrates numerous sets of sensors and devices via a data network enabling independent processes. The incorporation of the IoT in the industrial sector leads to the design of Industrial Internet of Things (IIoT), which find use in water distribution system, power plants, etc. Since the IIoT is susceptible to different kinds of attacks due to the utilization of Internet connection, an effective forensic investigation process becomes… More >

  • Open Access

    ARTICLE

    Intelligent Feature Selection with Deep Learning Based Financial Risk Assessment Model

    Thavavel Vaiyapuri1, K. Priyadarshini2, A. Hemlathadhevi3, M. Dhamodaran4, Ashit Kumar Dutta5, Irina V. Pustokhina6,*, Denis A. Pustokhin7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2429-2444, 2022, DOI:10.32604/cmc.2022.026204

    Abstract Due to global financial crisis, risk management has received significant attention to avoid loss and maximize profit in any business. Since the financial crisis prediction (FCP) process is mainly based on data driven decision making and intelligent models, artificial intelligence (AI) and machine learning (ML) models are widely utilized. This article introduces an intelligent feature selection with deep learning based financial risk assessment model (IFSDL-FRA). The proposed IFSDL-FRA technique aims to determine the financial crisis of a company or enterprise. In addition, the IFSDL-FRA technique involves the design of new water strider optimization algorithm based feature selection (WSOA-FS) manner to… More >

  • Open Access

    ARTICLE

    Heart Disease Diagnosis Using the Brute Force Algorithm and Machine Learning Techniques

    Junaid Rashid1, Samina Kanwal2, Jungeun Kim1,*, Muhammad Wasif Nisar2, Usman Naseem3, Amir Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3195-3211, 2022, DOI:10.32604/cmc.2022.026064

    Abstract Heart disease is one of the leading causes of death in the world today. Prediction of heart disease is a prominent topic in the clinical data processing. To increase patient survival rates, early diagnosis of heart disease is an important field of research in the medical field. There are many studies on the prediction of heart disease, but limited work is done on the selection of features. The selection of features is one of the best techniques for the diagnosis of heart diseases. In this research paper, we find optimal features using the brute-force algorithm, and machine learning techniques are… More >

  • Open Access

    ARTICLE

    Feature Selection with Optimal Stacked Sparse Autoencoder for Data Mining

    Manar Ahmed Hamza1,*, Siwar Ben Haj Hassine2, Ibrahim Abunadi3, Fahd N. Al-Wesabi2,4, Hadeel Alsolai5, Anwer Mustafa Hilal1, Ishfaq Yaseen1, Abdelwahed Motwakel1

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2581-2596, 2022, DOI:10.32604/cmc.2022.024764

    Abstract Data mining in the educational field can be used to optimize the teaching and learning performance among the students. The recently developed machine learning (ML) and deep learning (DL) approaches can be utilized to mine the data effectively. This study proposes an Improved Sailfish Optimizer-based Feature Selection with Optimal Stacked Sparse Autoencoder (ISOFS-OSSAE) for data mining and pattern recognition in the educational sector. The proposed ISOFS-OSSAE model aims to mine the educational data and derive decisions based on the feature selection and classification process. Moreover, the ISOFS-OSSAE model involves the design of the ISOFS technique to choose an optimal subset… More >

  • Open Access

    ARTICLE

    Detection of Parkinson’s Disease with Multiple Feature Extraction Models and Darknet CNN Classification

    G. Prema Arokia Mary1,*, N. Suganthi2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 333-345, 2022, DOI:10.32604/csse.2022.021164

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease in the central nervous system. Recently, more researches have been conducted in the determination of PD prediction which is really a challenging task. Due to the disorders in the central nervous system, the syndromes like off sleep, speech disorders, olfactory and autonomic dysfunction, sensory disorder symptoms will occur. The earliest diagnosing of PD is very challenging among the doctors community. There are techniques that are available in order to predict PD using symptoms and disorder measurement. It helps to save a million lives of future by early prediction. In this article, the early… More >

  • Open Access

    ARTICLE

    Feature Selection Using Grey Wolf Optimization with Random Differential Grouping

    R. S. Latha1,*, B. Saravana Balaji2, Nebojsa Bacanin3, Ivana Strumberger3, Miodrag Zivkovic3, Milos Kabiljo3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 317-332, 2022, DOI:10.32604/csse.2022.020487

    Abstract Big data are regarded as a tremendous technology for processing a huge variety of data in a short time and with a large storage capacity. The user’s access over the internet creates massive data processing over the internet. Big data require an intelligent feature selection model by addressing huge varieties of data. Traditional feature selection techniques are only applicable to simple data mining. Intelligent techniques are needed in big data processing and machine learning for an efficient classification. Major feature selection algorithms read the input features as they are. Then, the features are preprocessed and classified. Here, an algorithm does… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization Algorithm for Unconstrained Function and Feature Selection

    Ali E. Takieldeen1, El-Sayed M. El-kenawy1,2, Mohammed Hadwan3,4,5,*, Rokaia M. Zaki6,7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1465-1481, 2022, DOI:10.32604/cmc.2022.026026

    Abstract Dipper throated optimization (DTO) algorithm is a novel with a very efficient metaheuristic inspired by the dipper throated bird. DTO has its unique hunting technique by performing rapid bowing movements. To show the efficiency of the proposed algorithm, DTO is tested and compared to the algorithms of Particle Swarm Optimization (PSO), Whale Optimization Algorithm (WOA), Grey Wolf Optimizer (GWO), and Genetic Algorithm (GA) based on the seven unimodal benchmark functions. Then, ANOVA and Wilcoxon rank-sum tests are performed to confirm the effectiveness of the DTO compared to other optimization techniques. Additionally, to demonstrate the proposed algorithm's suitability for solving complex… More >

  • Open Access

    ARTICLE

    Malware Detection Using Decision Tree Based SVM Classifier for IoT

    Anwer Mustafa Hilal1,*, Siwar Ben Haj Hassine2, Souad Larabi-Marie-Sainte3, Nadhem Nemri2, Mohamed K. Nour4, Abdelwahed Motwakel1, Abu Sarwar Zamani1, Mesfer Al Duhayyim5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 713-726, 2022, DOI:10.32604/cmc.2022.024501

    Abstract The development in Information and Communication Technology has led to the evolution of new computing and communication environment. Technological revolution with Internet of Things (IoTs) has developed various applications in almost all domains from health care, education to entertainment with sensors and smart devices. One of the subsets of IoT is Internet of Medical things (IoMT) which connects medical devices, hardware and software applications through internet. IoMT enables secure wireless communication over the Internet to allow efficient analysis of medical data. With these smart advancements and exploitation of smart IoT devices in health care technology there increases threat and malware… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Internet of Things Cyberattacks

    Manal Alanazi*, Ahamed Aljuhani

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 261-279, 2022, DOI:10.32604/cmc.2022.024496

    Abstract The Internet of Things (IoT) has been deployed in diverse critical sectors with the aim of improving quality of service and facilitating human lives. The IoT revolution has redefined digital services in different domains by improving efficiency, productivity, and cost-effectiveness. Many service providers have adapted IoT systems or plan to integrate them as integral parts of their systems’ operation; however, IoT security issues remain a significant challenge. To minimize the risk of cyberattacks on IoT networks, anomaly detection based on machine learning can be an effective security solution to overcome a wide range of IoT cyberattacks. Although various detection techniques… More >

  • Open Access

    ARTICLE

    A Novel Framework for Windows Malware Detection Using a Deep Learning Approach

    Abdulbasit A. Darem*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 461-479, 2022, DOI:10.32604/cmc.2022.023566

    Abstract Malicious software (malware) is one of the main cyber threats that organizations and Internet users are currently facing. Malware is a software code developed by cybercriminals for damage purposes, such as corrupting the system and data as well as stealing sensitive data. The damage caused by malware is substantially increasing every day. There is a need to detect malware efficiently and automatically and remove threats quickly from the systems. Although there are various approaches to tackle malware problems, their prevalence and stealthiness necessitate an effective method for the detection and prevention of malware attacks. The deep learning-based approach is recently… More >

Displaying 141-150 on page 15 of 231. Per Page