Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (62)
  • Open Access

    ARTICLE

    Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture

    Usman Ahmad1, Muhammad Junaid Ali2, Faizan Ahmed Khan3, Arfat Ahmad Khan4, Arif Ur Rehman1, Malik Muhammad Ali Shahid5, Mohd Anul Haq6,*, Ilyas Khan7, Zamil S. Alzamil6, Ahmed Alhussen8

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2125-2140, 2023, DOI:10.32604/csse.2023.031008

    Abstract Building an automatic fish recognition and detection system for large-scale fish classes is helpful for marine researchers and marine scientists because there are large numbers of fish species. However, it is quite difficult to build such systems owing to the lack of data imbalance problems and large number of classes. To solve these issues, we propose a transfer learning-based technique in which we use Efficient-Net, which is pre-trained on ImageNet dataset and fine-tuned on QuT Fish Database, which is a large scale dataset. Furthermore, prior to the activation layer, we use Global Average Pooling (GAP) instead of dense layer with… More >

  • Open Access

    ARTICLE

    Optimized Deep Learning Model for Effective Spectrum Sensing in Dynamic SNR Scenario

    G. Arunachalam1,*, P. SureshKumar2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1279-1294, 2023, DOI:10.32604/csse.2023.031001

    Abstract The main components of Cognitive Radio networks are Primary Users (PU) and Secondary Users (SU). The most essential method used in Cognitive networks is Spectrum Sensing, which detects the spectrum band and opportunistically accesses the free white areas for different users. Exploiting the free spaces helps to increase the spectrum efficiency. But the existing spectrum sensing techniques such as energy detectors, cyclo-stationary detectors suffer from various problems such as complexity, non-responsive behaviors under low Signal to Noise Ratio (SNR) and computational overhead, which affects the performance of the sensing accuracy. Many algorithms such as Long-Short Term Memory (LSTM), Convolutional Neural… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the Advanced Encryption Standard (AES) algorithm… More >

  • Open Access

    ARTICLE

    Jellyfish Search Optimization with Deep Learning Driven Autism Spectrum Disorder Classification

    S. Rama Sree1, Inderjeet Kaur2, Alexey Tikhonov3, E. Laxmi Lydia4, Ahmed A. Thabit5, Zahraa H. Kareem6, Yousif Kerrar Yousif7, Ahmed Alkhayyat8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2195-2209, 2023, DOI:10.32604/cmc.2023.032586

    Abstract Autism spectrum disorder (ASD) is regarded as a neurological disorder well-defined by a specific set of problems associated with social skills, recurrent conduct, and communication. Identifying ASD as soon as possible is favourable due to prior identification of ASD permits prompt interferences in children with ASD. Recognition of ASD related to objective pathogenic mutation screening is the initial step against prior intervention and efficient treatment of children who were affected. Nowadays, healthcare and machine learning (ML) industries are combined for determining the existence of various diseases. This article devises a Jellyfish Search Optimization with Deep Learning Driven ASD Detection and… More >

  • Open Access

    ARTICLE

    Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Mohamed K. Nour4, Mashael M. Asiri5, Ali M. Al-Sharafi6, Mahmoud Othman7, Abdelwahed Motwakel2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 607-621, 2023, DOI:10.32604/cmc.2023.031371

    Abstract Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital era. Malicious Uniform Resource Locators (URLs) can be embedded in email or Twitter and used to lure vulnerable internet users to implement malicious data in their systems. This may result in compromised security of the systems, scams, and other such cyberattacks. These attacks hijack huge quantities of the available data, incurring heavy financial loss. At the same time, Machine Learning (ML) and Deep Learning (DL) models paved the way for designing models that can detect malicious URLs accurately and classify them. With this motivation,… More >

  • Open Access

    ARTICLE

    Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection

    Mazen Mushabab Alqahtani1, Ashit Kumar Dutta2, Sultan Almotairi3, M. Ilayaraja4, Amani Abdulrahman Albraikan5, Fahd N. Al-Wesabi6,7,*, Mesfer Al Duhayyim8

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 217-233, 2023, DOI:10.32604/cmc.2023.025280

    Abstract Recent developments in digital cameras and electronic gadgets coupled with Machine Learning (ML) and Deep Learning (DL)-based automated apple leaf disease detection models are commonly employed as reasonable alternatives to traditional visual inspection models. In this background, the current paper devises an Effective Sailfish Optimizer with EfficientNet-based Apple Leaf disease detection (ESFO-EALD) model. The goal of the proposed ESFO-EALD technique is to identify the occurrence of plant leaf diseases automatically. In this scenario, Median Filtering (MF) approach is utilized to boost the quality of apple plant leaf images. Moreover, SFO with Kapur's entropy-based segmentation technique is also utilized for the… More >

  • Open Access

    ARTICLE

    Cephalopods Classification Using Fine Tuned Lightweight Transfer Learning Models

    P. Anantha Prabha1,*, G. Suchitra2, R. Saravanan3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3065-3079, 2023, DOI:10.32604/iasc.2023.030017

    Abstract Cephalopods identification is a formidable task that involves hand inspection and close observation by a malacologist. Manual observation and identification take time and are always contingent on the involvement of experts. A system is proposed to alleviate this challenge that uses transfer learning techniques to classify the cephalopods automatically. In the proposed method, only the Lightweight pre-trained networks are chosen to enable IoT in the task of cephalopod recognition. First, the efficiency of the chosen models is determined by evaluating their performance and comparing the findings. Second, the models are fine-tuned by adding dense layers and tweaking hyperparameters to improve… More >

  • Open Access

    ARTICLE

    A Novel Approach to Design Distribution Preserving Framework for Big Data

    Mini Prince1,*, P. M. Joe Prathap2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2789-2803, 2023, DOI:10.32604/iasc.2023.029533

    Abstract

    In several fields like financial dealing, industry, business, medicine, et cetera, Big Data (BD) has been utilized extensively, which is nothing but a collection of a huge amount of data. However, it is highly complicated along with time-consuming to process a massive amount of data. Thus, to design the Distribution Preserving Framework for BD, a novel methodology has been proposed utilizing Manhattan Distance (MD)-centered Partition Around Medoid (MD–PAM) along with Conjugate Gradient Artificial Neural Network (CG-ANN), which undergoes various steps to reduce the complications of BD. Firstly, the data are processed in the pre-processing phase by mitigating the data repetition… More >

  • Open Access

    ARTICLE

    Sailfish Optimization with Deep Learning Based Oral Cancer Classification Model

    Mesfer Al Duhayyim1,*, Areej A. Malibari2, Sami Dhahbi3, Mohamed K. Nour4, Isra Al-Turaiki5, Marwa Obayya6, Abdullah Mohamed7

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 753-767, 2023, DOI:10.32604/csse.2023.030556

    Abstract Recently, computer aided diagnosis (CAD) model becomes an effective tool for decision making in healthcare sector. The advances in computer vision and artificial intelligence (AI) techniques have resulted in the effective design of CAD models, which enables to detection of the existence of diseases using various imaging modalities. Oral cancer (OC) has commonly occurred in head and neck globally. Earlier identification of OC enables to improve survival rate and reduce mortality rate. Therefore, the design of CAD model for OC detection and classification becomes essential. Therefore, this study introduces a novel Computer Aided Diagnosis for OC using Sailfish Optimization with… More >

Displaying 11-20 on page 2 of 62. Per Page