Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,852)
  • Open Access

    ARTICLE

    Cardiovascular Disease Prediction Using Risk Factors: A Comparative Performance Analysis of Machine Learning Models

    Adil Hussain1,*, Ayesha Aslam2

    Journal on Artificial Intelligence, Vol.6, pp. 129-152, 2024, DOI:10.32604/jai.2024.050277

    Abstract The diagnosis and prognosis of cardiovascular diseases are critical medical responsibilities that assist cardiologists in correctly classifying patients and treating them accordingly. The utilization of machine learning in the medical domain has witnessed a notable surge due to its ability to discern patterns from vast amounts of data. Machine learning algorithms that can categorize cases of cardiovascular illness may help doctors reduce the number of wrong diagnoses. This research investigates the efficacy of different machine learning algorithms in predicting cardiovascular disease in accordance with risk factors. This study utilizes a variety of machine learning models, including Logistic Regression, Random Forest,… More >

  • Open Access

    REVIEW

    Machine Learning-Based Intelligent Auscultation Techniques in Congenital Heart Disease: Application and Development

    Yang Wang#, Xun Yang#, Mingtang Ye, Yuhang Zhao, Runsen Chen, Min Da, Zhiqi Wang, Xuming Mo, Jirong Qi*

    Congenital Heart Disease, Vol.19, No.2, pp. 219-231, 2024, DOI:10.32604/chd.2024.048314

    Abstract Congenital heart disease (CHD), the most prevalent congenital ailment, has seen advancements in the “dual indicator” screening program. This facilitates the early-stage diagnosis and treatment of children with CHD, subsequently enhancing their survival rates. While cardiac auscultation offers an objective reflection of cardiac abnormalities and function, its evaluation is significantly influenced by personal experience and external factors, rendering it susceptible to misdiagnosis and omission. In recent years, continuous progress in artificial intelligence (AI) has enabled the digital acquisition, storage, and analysis of heart sound signals, paving the way for intelligent CHD auscultation-assisted diagnostic technology. Although there has been a surge… More > Graphic Abstract

    Machine Learning-Based Intelligent Auscultation Techniques in Congenital Heart Disease: Application and Development

  • Open Access

    REVIEW

    A Review of NILM Applications with Machine Learning Approaches

    Maheesha Dhashantha Silva*, Qi Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2971-2989, 2024, DOI:10.32604/cmc.2024.051289

    Abstract In recent years, Non-Intrusive Load Monitoring (NILM) has become an emerging approach that provides affordable energy management solutions using aggregated load obtained from a single smart meter in the power grid. Furthermore, by integrating Machine Learning (ML), NILM can efficiently use electrical energy and offer less of a burden for the energy monitoring process. However, conducted research works have limitations for real-time implementation due to the practical issues. This paper aims to identify the contribution of ML approaches to developing a reliable Energy Management (EM) solution with NILM. Firstly, phases of the NILM are discussed, along with the research works… More >

  • Open Access

    ARTICLE

    QoS Routing Optimization Based on Deep Reinforcement Learning in SDN

    Yu Song1, Xusheng Qian2, Nan Zhang3, Wei Wang2, Ao Xiong1,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3007-3021, 2024, DOI:10.32604/cmc.2024.051217

    Abstract To enhance the efficiency and expediency of issuing e-licenses within the power sector, we must confront the challenge of managing the surging demand for data traffic. Within this realm, the network imposes stringent Quality of Service (QoS) requirements, revealing the inadequacies of traditional routing allocation mechanisms in accommodating such extensive data flows. In response to the imperative of handling a substantial influx of data requests promptly and alleviating the constraints of existing technologies and network congestion, we present an architecture for QoS routing optimization with in Software Defined Network (SDN), leveraging deep reinforcement learning. This innovative approach entails the separation… More >

  • Open Access

    ARTICLE

    Relational Turkish Text Classification Using Distant Supervised Entities and Relations

    Halil Ibrahim Okur1,2,*, Kadir Tohma1, Ahmet Sertbas2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2209-2228, 2024, DOI:10.32604/cmc.2024.050585

    Abstract Text classification, by automatically categorizing texts, is one of the foundational elements of natural language processing applications. This study investigates how text classification performance can be improved through the integration of entity-relation information obtained from the Wikidata (Wikipedia database) database and BERT-based pre-trained Named Entity Recognition (NER) models. Focusing on a significant challenge in the field of natural language processing (NLP), the research evaluates the potential of using entity and relational information to extract deeper meaning from texts. The adopted methodology encompasses a comprehensive approach that includes text preprocessing, entity detection, and the integration of relational information. Experiments conducted on… More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281

    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for different vulnerabilities, which are used… More >

  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs subsequently transmit packets to neighboring… More >

  • Open Access

    ARTICLE

    Byzantine Robust Federated Learning Scheme Based on Backdoor Triggers

    Zheng Yang, Ke Gu*, Yiming Zuo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2813-2831, 2024, DOI:10.32604/cmc.2024.050025

    Abstract Federated learning is widely used to solve the problem of data decentralization and can provide privacy protection for data owners. However, since multiple participants are required in federated learning, this allows attackers to compromise. Byzantine attacks pose great threats to federated learning. Byzantine attackers upload maliciously created local models to the server to affect the prediction performance and training speed of the global model. To defend against Byzantine attacks, we propose a Byzantine robust federated learning scheme based on backdoor triggers. In our scheme, backdoor triggers are embedded into benign data samples, and then malicious local models can be identified… More >

  • Open Access

    ARTICLE

    Image Segmentation-P300 Selector: A Brain–Computer Interface System for Target Selection

    Hang Sun, Changsheng Li*, He Zhang

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2505-2522, 2024, DOI:10.32604/cmc.2024.049898

    Abstract Brain–computer interface (BCI) systems, such as the P300 speller, enable patients to express intentions without necessitating extensive training. However, the complexity of operational instructions and the slow pace of character spelling pose challenges for some patients. In this paper, an image segmentation P300 selector based on YOLOv7-mask and DeepSORT is proposed. The proposed system utilizes a camera to capture real-world objects for classification and tracking. By applying predefined stimulation rules and object-specific masks, the proposed system triggers stimuli associated with the objects displayed on the screen, inducing the generation of P300 signals in the patient’s brain. Its video processing mechanism… More >

  • Open Access

    REVIEW

    Federated Learning on Internet of Things: Extensive and Systematic Review

    Meenakshi Aggarwal1, Vikas Khullar1, Sunita Rani2, Thomas André Prola3,4,5, Shyama Barna Bhattacharjee6, Sarowar Morshed Shawon7, Nitin Goyal8,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1795-1834, 2024, DOI:10.32604/cmc.2024.049846

    Abstract The proliferation of IoT devices requires innovative approaches to gaining insights while preserving privacy and resources amid unprecedented data generation. However, FL development for IoT is still in its infancy and needs to be explored in various areas to understand the key challenges for deployment in real-world scenarios. The paper systematically reviewed the available literature using the PRISMA guiding principle. The study aims to provide a detailed overview of the increasing use of FL in IoT networks, including the architecture and challenges. A systematic review approach is used to collect, categorize and analyze FL-IoT-based articles. A search was performed in… More >

Displaying 31-40 on page 4 of 2852. Per Page