Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN

    S. Rameshkumar1,*, R. Ganesan2, A. Merline1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2379-2394, 2023, DOI:10.32604/csse.2023.027910

    Abstract In The Wireless Multimedia Sensor Network (WNSMs) have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets. By utilising portable technologies, it achieves solid and significant results in wireless communication, media transfer, and digital transmission. Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature, moisture content, and other environmental conditions in recent decades. WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appropriate audio and video information. Many video sensor network studies focus on lowering power… More >

  • Open Access

    ARTICLE

    Comparative Analysis Using Machine Learning Techniques for Fine Grain Sentiments

    Zeeshan Ahmad1, Waqas Haider Bangyal1, Kashif Nisar2,3,*, Muhammad Reazul Haque4, M. Adil Khan5

    Journal on Artificial Intelligence, Vol.4, No.1, pp. 49-60, 2022, DOI:10.32604/jai.2022.017992

    Abstract Huge amount of data is being produced every second for microblogs, different content sharing sites, and social networking. Sentimental classification is a tool that is frequently used to identify underlying opinions and sentiments present in the text and classifying them. It is widely used for social media platforms to find user's sentiments about a particular topic or product. Capturing, assembling, and analyzing sentiments has been challenge for researchers. To handle these challenges, we present a comparative sentiment analysis study in which we used the fine-grained Stanford Sentiment Treebank (SST) dataset, based on 215,154 exclusive texts of different lengths that are… More >

  • Open Access

    ARTICLE

    Practical Machine Learning Techniques for COVID-19 Detection Using Chest X-Ray Images

    Yurananatul Mangalmurti, Naruemon Wattanapongsakorn*

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 733-752, 2022, DOI:10.32604/iasc.2022.025073

    Abstract This paper presents effective techniques for automatic detection/classification of COVID-19 and other lung diseases using machine learning, including deep learning with convolutional neural networks (CNN) and classical machine learning techniques. We had access to a large number of chest X-ray images to use as input data. The data contains various categories including COVID-19, Pneumonia, Pneumothorax, Atelectasis, and Normal (without disease). In addition, chest X-ray images with many findings (abnormalities and diseases) from the National Institutes of Health (NIH) was also considered. Our deep learning approach used a CNN architecture with VGG16 and VGG19 models which were pre-trained with ImageNet. We… More >

  • Open Access

    ARTICLE

    Heart Disease Diagnosis Using the Brute Force Algorithm and Machine Learning Techniques

    Junaid Rashid1, Samina Kanwal2, Jungeun Kim1,*, Muhammad Wasif Nisar2, Usman Naseem3, Amir Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3195-3211, 2022, DOI:10.32604/cmc.2022.026064

    Abstract Heart disease is one of the leading causes of death in the world today. Prediction of heart disease is a prominent topic in the clinical data processing. To increase patient survival rates, early diagnosis of heart disease is an important field of research in the medical field. There are many studies on the prediction of heart disease, but limited work is done on the selection of features. The selection of features is one of the best techniques for the diagnosis of heart diseases. In this research paper, we find optimal features using the brute-force algorithm, and machine learning techniques are… More >

  • Open Access

    ARTICLE

    Evaluating the Clogging Behavior of Pervious Concrete (PC) Using the Machine Learning Techniques

    Jiandong Huang1, Jia Zhang1, Yuan Gao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 805-821, 2022, DOI:10.32604/cmes.2022.017792

    Abstract

    Pervious concrete (PC) is at risk of clogging due to the continuous blockage of sand into it during its service time. This study aims to evaluate and predict such clogging behavior of PC using hybrid machine learning techniques. Based on the 84 groups of the dataset developed in the earlier study, the clogging behavior of the PC was determined by the algorithm combing the SVM (support vector machines) and particle swarm optimization (PSO) methods. The PSO algorithm was employed to adjust the hyperparameters of the SVM and verify the performance using 10-fold cross-validation. The predicting results of the developed model… More >

  • Open Access

    ARTICLE

    Spectrum Prediction in Cognitive Radio Network Using Machine Learning Techniques

    D. Arivudainambi1, S. Mangairkarasi1,*, K. A. Varun Kumar2

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1525-1540, 2022, DOI:10.32604/iasc.2022.020463

    Abstract Cognitive Radio (CR) aims to achieve efficient utilization of scarcely available radio spectrum. Spectrum sensing in CR is a basic process for identifying the existence or absence of primary users. In spectrum sensing, CR users suffer from deep fading effects and it requires additional sensing time to identify the primary user. To overcome these challenges, we frame Spectrum Prediction-Channel Allocation (SP-CA) algorithm which consists of three phases. First, clustering mechanisms to select the spectrum coordinator. Second, Eigenvalue based detection method to expand the sensing accuracy of the secondary user. Third, Bayesian inference approach to reduce the performance degradation of the… More >

  • Open Access

    ARTICLE

    Machine Learning Technique to Detect Radiations in the Brain

    E. Gothai1,*, A. Baseera2, P. Prabu3, K. Venkatachalam4, K. Saravanan5, S. SathishKumar6

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 149-163, 2022, DOI:10.32604/csse.2022.020619

    Abstract The brain of humans and other organisms is affected in various ways through the electromagnetic field (EMF) radiations generated by mobile phones and cell phone towers. Morphological variations in the brain are caused by the neurological changes due to the revelation of EMF. Cellular level analysis is used to measure and detect the effect of mobile radiations, but its utilization seems very expensive, and it is a tedious process, where its analysis requires the preparation of cell suspension. In this regard, this research article proposes optimal broadcasting learning to detect changes in brain morphology due to the revelation of EMF.… More >

  • Open Access

    ARTICLE

    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of the SDN that has a… More >

  • Open Access

    ARTICLE

    Prediction of Cardiovascular Disease Using Machine Learning Technique—A Modern Approach

    Visvasam Devadoss Ambeth Kumar1, Chetan Swarup2, Indhumathi Murugan1, Abhishek Kumar3, Kamred Udham Singh4, Teekam Singh5, Ramu Dubey6,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 855-869, 2022, DOI:10.32604/cmc.2022.021582

    Abstract Cardio Vascular disease (CVD), involving the heart and blood vessels is one of the most leading causes of death throughout the world. There are several risk factors for causing heart diseases like sedentary lifestyle, unhealthy diet, obesity, diabetes, hypertension, smoking and consumption of alcohol, stress, hereditary factory etc. Predicting cardiovascular disease and improving and treating the risk factors at an early stage are of paramount importance to save the precious life of a human being. At present, the highly stressful life with bad lifestyle activities causes heart disease at a very young age. The main aim of this research is… More >

  • Open Access

    ARTICLE

    Industrial Datasets with ICS Testbed and Attack Detection Using Machine Learning Techniques

    Sinil Mubarak1, Mohamed Hadi Habaebi1,*, Md Rafiqul Islam1, Asaad Balla1, Mohammad Tahir2, Elfatih A. A. Elsheikh3, F. M. Suliman3

    Intelligent Automation & Soft Computing, Vol.31, No.3, pp. 1345-1360, 2022, DOI:10.32604/iasc.2022.020801

    Abstract Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to the outside world. Cybersecurity solutions for Information technology (IT) secured with firewalls, intrusion detection/protection systems do nothing much for Operational technology (OT) ICS. An innovative concept of using real operational technology network traffic-based testbed, for cyber-physical system simulation and analysis, is presented. The testbed is equipped with real-time attacks using in-house… More >

Displaying 21-30 on page 3 of 45. Per Page