Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    Home Automation-Based Health Assessment Along Gesture Recognition via Inertial Sensors

    Hammad Rustam1, Muhammad Muneeb1, Suliman A. Alsuhibany2, Yazeed Yasin Ghadi3, Tamara Al Shloul4, Ahmad Jalal1, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2331-2346, 2023, DOI:10.32604/cmc.2023.028712

    Abstract Hand gesture recognition (HGR) is used in a numerous applications, including medical health-care, industrial purpose and sports detection. We have developed a real-time hand gesture recognition system using inertial sensors for the smart home application. Developing such a model facilitates the medical health field (elders or disabled ones). Home automation has also been proven to be a tremendous benefit for the elderly and disabled. Residents are admitted to smart homes for comfort, luxury, improved quality of life, and protection against intrusion and burglars. This paper proposes a novel system that uses principal component analysis, linear discrimination analysis feature extraction, and… More >

  • Open Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669

    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive… More >

  • Open Access

    ARTICLE

    Night Vision Object Tracking System Using Correlation Aware LSTM-Based Modified Yolo Algorithm

    R. Anandha Murugan1,*, B. Sathyabama2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 353-368, 2023, DOI:10.32604/iasc.2023.032355

    Abstract Improved picture quality is critical to the effectiveness of object recognition and tracking. The consistency of those photos is impacted by night-video systems because the contrast between high-profile items and different atmospheric conditions, such as mist, fog, dust etc. The pictures then shift in intensity, colour, polarity and consistency. A general challenge for computer vision analyses lies in the horrid appearance of night images in arbitrary illumination and ambient environments. In recent years, target recognition techniques focused on deep learning and machine learning have become standard algorithms for object detection with the exponential growth of computer performance capabilities. However, the… More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster Head (CH). Then, the data… More >

  • Open Access

    ARTICLE

    A Highly Accurate Dysphonia Detection System Using Linear Discriminant Analysis

    Anas Basalamah1, Mahedi Hasan2, Shovan Bhowmik2, Shaikh Akib Shahriyar2,*

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1921-1938, 2023, DOI:10.32604/csse.2023.027399

    Abstract The recognition of pathological voice is considered a difficult task for speech analysis. Moreover, otolaryngologists needed to rely on oral communication with patients to discover traces of voice pathologies like dysphonia that are caused by voice alteration of vocal folds and their accuracy is between 60%–70%. To enhance detection accuracy and reduce processing speed of dysphonia detection, a novel approach is proposed in this paper. We have leveraged Linear Discriminant Analysis (LDA) to train multiple Machine Learning (ML) models for dysphonia detection. Several ML models are utilized like Support Vector Machine (SVM), Logistic Regression, and K-nearest neighbor (K-NN) to predict… More >

  • Open Access

    ARTICLE

    Statistical Analysis with Dingo Optimizer Enabled Routing for Wireless Sensor Networks

    Abdulaziz S. Alghamdi1,*, Randa Alharbi2, Suliman A. Alsuhibany3, Sayed Abdel-Khalek4,5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2865-2878, 2022, DOI:10.32604/cmc.2022.028088

    Abstract Security is a vital parameter to conserve energy in wireless sensor networks (WSN). Trust management in the WSN is a crucial process as trust is utilized when collaboration is important for accomplishing trustworthy data transmission. But the available routing techniques do not involve security in the design of routing techniques. This study develops a novel statistical analysis with dingo optimizer enabled reliable routing scheme (SADO-RRS) for WSN. The proposed SADO-RRS technique aims to detect the existence of attacks and optimal routes in WSN. In addition, the presented SADO-RRS technique derives a new statistics based linear discriminant analysis (LDA) for attack… More >

  • Open Access

    ARTICLE

    Incremental Linear Discriminant Analysis Dimensionality Reduction and 3D Dynamic Hierarchical Clustering WSNs

    G. Divya Mohana Priya1,*, M. Karthikeyan1, K. Murugan2

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 471-486, 2022, DOI:10.32604/csse.2022.021023

    Abstract Optimizing the sensor energy is one of the most important concern in Three-Dimensional (3D) Wireless Sensor Networks (WSNs). An improved dynamic hierarchical clustering has been used in previous works that computes optimum clusters count and thus, the total consumption of energy is optimal. However, the computational complexity will be increased due to data dimension, and this leads to increase in delay in network data transmission and reception. For solving the above-mentioned issues, an efficient dimensionality reduction model based on Incremental Linear Discriminant Analysis (ILDA) is proposed for 3D hierarchical clustering WSNs. The major objective of the proposed work is to… More >

  • Open Access

    ARTICLE

    Effective Classification of Synovial Sarcoma Cancer Using Structure Features and Support Vectors

    P. Arunachalam1, N. Janakiraman1, Junaid Rashid2, Jungeun Kim2,*, Sovan Samanta3, Usman Naseem4, Arun Kumar Sivaraman5, A. Balasundaram6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2521-2543, 2022, DOI:10.32604/cmc.2022.025339

    Abstract In this research work, we proposed a medical image analysis framework with two separate releases whether or not Synovial Sarcoma (SS) is the cell structure for cancer. Within this framework the histopathology images are decomposed into a third-level sub-band using a two-dimensional Discrete Wavelet Transform. Subsequently, the structure features (SFs) such as Principal Components Analysis (PCA), Independent Components Analysis (ICA) and Linear Discriminant Analysis (LDA) were extracted from this sub-band image representation with the distribution of wavelet coefficients. These SFs are used as inputs of the Support Vector Machine (SVM) classifier. Also, classification of PCA + SVM, ICA + SVM,… More >

  • Open Access

    ARTICLE

    Benchmarking Performance of Document Level Classification and Topic Modeling

    Muhammad Shahid Bhatti1,*, Azmat Ullah1, Rohaya Latip2, Abid Sohail1, Anum Riaz1, Rohail Hassan3

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 125-141, 2022, DOI:10.32604/cmc.2022.020083

    Abstract Text classification of low resource language is always a trivial and challenging problem. This paper discusses the process of Urdu news classification and Urdu documents similarity. Urdu is one of the most famous spoken languages in Asia. The implementation of computational methodologies for text classification has increased over time. However, Urdu language has not much experimented with research, it does not have readily available datasets, which turn out to be the primary reason behind limited research and applying the latest methodologies to the Urdu. To overcome these obstacles, a medium-sized dataset having six categories is collected from authentic Pakistani news… More >

  • Open Access

    ARTICLE

    Facial Expression Recognition Using Enhanced Convolution Neural Network with Attention Mechanism

    K. Prabhu1,*, S. SathishKumar2, M. Sivachitra3, S. Dineshkumar2, P. Sathiyabama4

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 415-426, 2022, DOI:10.32604/csse.2022.019749

    Abstract Facial Expression Recognition (FER) has been an interesting area of research in places where there is human-computer interaction. Human psychology, emotions and behaviors can be analyzed in FER. Classifiers used in FER have been perfect on normal faces but have been found to be constrained in occluded faces. Recently, Deep Learning Techniques (DLT) have gained popularity in applications of real-world problems including recognition of human emotions. The human face reflects emotional states and human intentions. An expression is the most natural and powerful way of communicating non-verbally. Systems which form communications between the two are termed Human Machine Interaction (HMI)… More >

Displaying 1-10 on page 1 of 13. Per Page