Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture

    Usman Ahmad1, Muhammad Junaid Ali2, Faizan Ahmed Khan3, Arfat Ahmad Khan4, Arif Ur Rehman1, Malik Muhammad Ali Shahid5, Mohd Anul Haq6,*, Ilyas Khan7, Zamil S. Alzamil6, Ahmed Alhussen8

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2125-2140, 2023, DOI:10.32604/csse.2023.031008

    Abstract Building an automatic fish recognition and detection system for large-scale fish classes is helpful for marine researchers and marine scientists because there are large numbers of fish species. However, it is quite difficult to build such systems owing to the lack of data imbalance problems and large number of classes. To solve these issues, we propose a transfer learning-based technique in which we use Efficient-Net, which is pre-trained on ImageNet dataset and fine-tuned on QuT Fish Database, which is a large scale dataset. Furthermore, prior to the activation layer, we use Global Average Pooling (GAP) instead of dense layer with… More >

  • Open Access

    ARTICLE

    Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention

    Shyla1,*, Vishal Bhatnagar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2431-2447, 2023, DOI:10.32604/iasc.2023.029126

    Abstract The exponential pace of the spread of the digital world has served as one of the assisting forces to generate an enormous amount of information flowing over the network. The data will always remain under the threat of technological suffering where intruders and hackers consistently try to breach the security systems by gaining personal information insights. In this paper, the authors proposed the HDTbNB (Hybrid Decision Tree-based Naïve Bayes) algorithm to find the essential features without data scaling to maximize the model’s performance by reducing the false alarm rate and training period to reduce zero frequency with enhanced accuracy of… More >

  • Open Access

    ARTICLE

    Predict the Chances of Heart Abnormality in Diabetic Patients Through Machine Learning

    Monika Saraswat*, A. K. Wadhwani, Sulochana Wadhwani

    Journal on Artificial Intelligence, Vol.4, No.2, pp. 61-76, 2022, DOI:10.32604/jai.2022.028140

    Abstract Today, more families are affected by Diabetes Mellitus (DM) disease on account of its continually increasing occurrence. Most patients remain unknown about their health quality or the DM’s risk factors prior to diagnosis. The medical world has witnessed that individuals are affected by two different diabetes namely a) Type-1 diabetes (T1D), as well as b) Type-2 diabetes (T2D). As Type 2 Diabetes affects the other organs of the body, the proposed system concentrates specifically on Type 2 Diabetes. This work aims to ascertain the cardiac disorder in T2D patients. As of the ECG dataset, the requisite data is gathered it… More >

  • Open Access

    ARTICLE

    Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk

    Polin Rahman1, Ahmed Rifat1, MD. IftehadAmjad Chy1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Sultan Aljahdali2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.021469

    Abstract Heart failure is now widely spread throughout the world. Heart disease affects approximately 48% of the population. It is too expensive and also difficult to cure the disease. This research paper represents machine learning models to predict heart failure. The fundamental concept is to compare the correctness of various Machine Learning (ML) algorithms and boost algorithms to improve models’ accuracy for prediction. Some supervised algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Trees (DT), Random Forest (RF), Logistic Regression (LR) are considered to achieve the best results. Some boosting algorithms like Extreme Gradient Boosting (XGBoost) and CatBoost are… More >

  • Open Access

    ARTICLE

    Handling High Dimensionality in Ensemble Learning for Arrhythmia Prediction

    Fuad Ali Mohammed Al-Yarimi*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1729-1742, 2022, DOI:10.32604/iasc.2022.022418

    Abstract Computer-aided arrhythmia prediction from ECG (electrocardiograms) is essential in clinical practices, which promises to reduce the mortality caused by inexperienced clinical practitioners. Moreover, computer-aided methods often succeed in the early detection of arrhythmia scope from electrocardiogram reports. Machine learning is the buzz of computer-aided clinical practices. Particularly, computer-aided arrhythmia prediction methods highly adopted machine learning methods. However, the high dimensionality in feature values considered for the machine learning models’ training phase often causes false alarming. This manuscript addressed the high dimensionality in the learning phase and proposed an (Ensemble Learning method for Arrhythmia Prediction) ELAP (ensemble learning-based arrhythmia prediction). The… More >

  • Open Access

    ARTICLE

    Position Vectors Based Efficient Indoor Positioning System

    Ayesha Javed1, Mir Yasir Umair1,*, Alina Mirza1, Abdul Wakeel1, Fazli Subhan2, Wazir Zada Khan3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1781-1799, 2021, DOI:10.32604/cmc.2021.015229

    Abstract With the advent and advancements in the wireless technologies, Wi-Fi fingerprinting-based Indoor Positioning System (IPS) has become one of the most promising solutions for localization in indoor environments. Unlike the outdoor environment, the lack of line-of-sight propagation in an indoor environment keeps the interest of the researchers to develop efficient and precise positioning systems that can later be incorporated in numerous applications involving Internet of Things (IoTs) and green computing. In this paper, we have proposed a technique that combines the capabilities of multiple algorithms to overcome the complexities experienced indoors. Initially, in the database development phase, Motley Kennan propagation… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the… More >

Displaying 1-10 on page 1 of 8. Per Page