Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    Performances of K-Means Clustering Algorithm with Different Distance Metrics

    Taher M. Ghazal1,2, Muhammad Zahid Hussain3, Raed A. Said5, Afrozah Nadeem6, Mohammad Kamrul Hasan1, Munir Ahmad7, Muhammad Adnan Khan3,4,*, Muhammad Tahir Naseem3

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 735-742, 2021, DOI:10.32604/iasc.2021.019067 - 11 August 2021

    Abstract Clustering is the process of grouping the data based on their similar properties. Meanwhile, it is the categorization of a set of data into similar groups (clusters), and the elements in each cluster share similarities, where the similarity between elements in the same cluster must be smaller enough to the similarity between elements of different clusters. Hence, this similarity can be considered as a distance measure. One of the most popular clustering algorithms is K-means, where distance is measured between every point of the dataset and centroids of clusters to find similar data objects and More >

  • Open Access

    ARTICLE

    Development of Mental Health Literacy Scale for Depression Affecting the Help-Seeking Process in Health Professional Students

    Soshi Kodama1,*, Koichi Shido2, Nozomu Ikeda3

    International Journal of Mental Health Promotion, Vol.23, No.3, pp. 331-352, 2021, DOI:10.32604/IJMHP.2021.016337 - 23 July 2021

    Abstract Despite depression being a global mental health disorder, many people with depression do not seek psychiatric help. In particular, it has been reported that only 15.7% of medical students seek treatment. A longer duration of untreated illness (DUI) leads to clinically poor results. To shorten the DUI, the mental health literacy (MHL) with regard to depression needs to be improved, although it is unclear which MHL components will improve the help-seeking process. Additionally, the existing MHL scale for depression is poorly validated for structural validity. Therefore, the purpose of this study was to develop an… More >

  • Open Access

    ARTICLE

    Cluster Analysis for IR and NIR Spectroscopy: Current Practices to Future Perspectives

    Simon Crase1,2, Benjamin Hall2, Suresh N. Thennadil3,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1945-1965, 2021, DOI:10.32604/cmc.2021.018517 - 21 July 2021

    Abstract Supervised machine learning techniques have become well established in the study of spectroscopy data. However, the unsupervised learning technique of cluster analysis hasn’t reached the same level maturity in chemometric analysis. This paper surveys recent studies which apply cluster analysis to NIR and IR spectroscopy data. In addition, we summarize the current practices in cluster analysis of spectroscopy and contrast these with cluster analysis literature from the machine learning and pattern recognition domain. This includes practices in data pre-processing, feature extraction, clustering distance metrics, clustering algorithms and validation techniques. Special consideration is given to the More >

  • Open Access

    ARTICLE

    Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

    Amr Hefny1, Aboul Ella Hassanien2, Sameh H. Basha1,*

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2367-2386, 2021, DOI:10.32604/cmc.2021.018017 - 21 July 2021

    Abstract Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values: truth, indeterminacy, and falsity. These three values More >

  • Open Access

    ARTICLE

    An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics

    Naglaa F. Soliman1,2, Abeer D. Algarni1,*, Walid El-Shafai3, Fathi E. Abd El-Samie1,3, Ghada M. El Banby4

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1571-1595, 2021, DOI:10.32604/cmc.2021.016980 - 21 July 2021

    Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes… More >

  • Open Access

    ARTICLE

    Feature Selection Using Artificial Immune Network: An Approach for Software Defect Prediction

    Bushra Mumtaz1, Summrina Kanwal2,*, Sultan Alamri2, Faiza Khan1

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 669-684, 2021, DOI:10.32604/iasc.2021.018405 - 01 July 2021

    Abstract Software Defect Prediction (SDP) is a dynamic research field in the software industry. A quality software product results in customer satisfaction. However, the higher the number of user requirements, the more complex will be the software, with a correspondingly higher probability of failure. SDP is a challenging task requiring smart algorithms that can estimate the quality of a software component before it is handed over to the end-user. In this paper, we propose a hybrid approach to address this particular issue. Our approach combines the feature selection capability of the Optimized Artificial Immune Networks (Opt-aiNet) More >

  • Open Access

    ARTICLE

    Smartphone Security Using Swipe Behavior-based Authentication

    Adnan Bin Amanat Ali1, Vasaki Ponnusamy1, Anbuselvan Sangodiah1, Roobaea Alroobaea2, N. Z. Jhanjhi3,*, Uttam Ghosh4, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 571-585, 2021, DOI:10.32604/iasc.2021.015913 - 16 June 2021

    Abstract Most smartphone users prefer easy and convenient authentication without remembering complicated passwords or drawing intricate patterns. Preferably, after one-time authentication, there is no verification of the user’s authenticity. Therefore, security and privacy against unauthorized users is a crucial research area. Behavioral authentication is an emerging security technique that is gaining attention for its uniqueness and transparency. In this paper, a behavior-based authentication system is built using swipe movements to continuously authenticate the user after one-time traditional authentication. The key feature is the selection of an optimal feature set for the swipe movement. Five machine learning More >

  • Open Access

    ARTICLE

    Real-Time Multimodal Biometric Authentication of Human Using Face Feature Analysis

    Rohit Srivastava1, Ravi Tomar1, Ashutosh Sharma2, Gaurav Dhiman3, Naveen Chilamkurti4, Byung-Gyu Kim5,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1-19, 2021, DOI:10.32604/cmc.2021.015466 - 04 June 2021

    Abstract As multimedia data sharing increases, data security in mobile devices and its mechanism can be seen as critical. Biometrics combines the physiological and behavioral qualities of an individual to validate their character in real-time. Humans incorporate physiological attributes like a fingerprint, face, iris, palm print, finger knuckle print, Deoxyribonucleic Acid (DNA), and behavioral qualities like walk, voice, mark, or keystroke. The main goal of this paper is to design a robust framework for automatic face recognition. Scale Invariant Feature Transform (SIFT) and Speeded-up Robust Features (SURF) are employed for face recognition. Also, we propose a… More >

  • Open Access

    ARTICLE

    Data Mining of Scientometrics for Classifying Science Journals

    Muhammad Shaheen1,*, Ali Ahsan2, Saeed Iqbal3

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 873-885, 2021, DOI:10.32604/iasc.2021.016622 - 20 April 2021

    Abstract While there are several Scientometrics that can be used to assess the quality of the scientific work published in journals and conferences, yet; their validity and suitability is a great concern for stakeholders from both academia and industry. Different organizations have a different set of criteria for assessing the journals publishing scientific content. This is mostly based on the information generated from Scientometrics. A unified journal ranking system is therefore required that is acceptable to all concerned. This paper, collects data concerning Scientometrics for unified assessment of journals and proposes a mechanism of assessment using… More >

  • Open Access

    ARTICLE

    Code Smell Detection Using Whale Optimization Algorithm

    Moatasem M. Draz1, Marwa S. Farhan2,3,*, Sarah N. Abdulkader4,5, M. G. Gafar6,7

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1919-1935, 2021, DOI:10.32604/cmc.2021.015586 - 13 April 2021

    Abstract Software systems have been employed in many fields as a means to reduce human efforts; consequently, stakeholders are interested in more updates of their capabilities. Code smells arise as one of the obstacles in the software industry. They are characteristics of software source code that indicate a deeper problem in design. These smells appear not only in the design but also in software implementation. Code smells introduce bugs, affect software maintainability, and lead to higher maintenance costs. Uncovering code smells can be formulated as an optimization problem of finding the best detection rules. Although researchers… More >

Displaying 51-60 on page 6 of 78. Per Page