Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (422)
  • Open Access

    ARTICLE

    Machine Learning Stroke Prediction in Smart Healthcare: Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques

    Abdul Ahad1,2, Ira Puspitasari1,3,*, Jiangbin Zheng2, Shamsher Ullah4, Farhan Ullah5, Sheikh Tahir Bakhsh6, Ivan Miguel Pires7,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5115-5134, 2025, DOI:10.32604/cmc.2025.062605 - 06 March 2025

    Abstract This research explores the use of Fuzzy K-Nearest Neighbor (F-KNN) and Artificial Neural Networks (ANN) for predicting heart stroke incidents, focusing on the impact of feature selection methods, specifically Chi-Square and Best First Search (BFS). The study demonstrates that BFS significantly enhances the performance of both classifiers. With BFS preprocessing, the ANN model achieved an impressive accuracy of 97.5%, precision and recall of 97.5%, and an Receiver Operating Characteristics (ROC) area of 97.9%, outperforming the Chi-Square-based ANN, which recorded an accuracy of 91.4%. Similarly, the F-KNN model with BFS achieved an accuracy of 96.3%, precision More >

  • Open Access

    ARTICLE

    A Latency-Efficient Integration of Channel Attention for ConvNets

    Woongkyu Park1, Yeongyu Choi2, Mahammad Shareef Mekala3, Gyu Sang Choi1, Kook-Yeol Yoo1, Ho-youl Jung1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3965-3981, 2025, DOI:10.32604/cmc.2025.059966 - 06 March 2025

    Abstract Designing fast and accurate neural networks is becoming essential in various vision tasks. Recently, the use of attention mechanisms has increased, aimed at enhancing the vision task performance by selectively focusing on relevant parts of the input. In this paper, we concentrate on squeeze-and-excitation (SE)-based channel attention, considering the trade-off between latency and accuracy. We propose a variation of the SE module, called squeeze-and-excitation with layer normalization (SELN), in which layer normalization (LN) replaces the sigmoid activation function. This approach reduces the vanishing gradient problem while enhancing feature diversity and discriminability of channel attention. In… More >

  • Open Access

    ARTICLE

    SFPBL: Soft Filter Pruning Based on Logistic Growth Differential Equation for Neural Network

    Can Hu1, Shanqing Zhang2,*, Kewei Tao2, Gaoming Yang1, Li Li2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4913-4930, 2025, DOI:10.32604/cmc.2025.059770 - 06 March 2025

    Abstract The surge of large-scale models in recent years has led to breakthroughs in numerous fields, but it has also introduced higher computational costs and more complex network architectures. These increasingly large and intricate networks pose challenges for deployment and execution while also exacerbating the issue of network over-parameterization. To address this issue, various network compression techniques have been developed, such as network pruning. A typical pruning algorithm follows a three-step pipeline involving training, pruning, and retraining. Existing methods often directly set the pruned filters to zero during retraining, significantly reducing the parameter space. However, this… More >

  • Open Access

    ARTICLE

    MMH-FE: A Multi-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption

    Hao Li1,#, Kuan Shao1,#, Xin Wang2, Mufeng Wang3, Zhenyong Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5387-5405, 2025, DOI:10.32604/cmc.2025.059718 - 06 March 2025

    Abstract Due to the development of cloud computing and machine learning, users can upload their data to the cloud for machine learning model training. However, dishonest clouds may infer user data, resulting in user data leakage. Previous schemes have achieved secure outsourced computing, but they suffer from low computational accuracy, difficult-to-handle heterogeneous distribution of data from multiple sources, and high computational cost, which result in extremely poor user experience and expensive cloud computing costs. To address the above problems, we propose a multi-precision, multi-sourced, and multi-key outsourcing neural network training scheme. Firstly, we design a multi-precision More >

  • Open Access

    ARTICLE

    Deep Convolution Neural Networks for Image-Based Android Malware Classification

    Amel Ksibi1,*, Mohammed Zakariah2, Latifah Almuqren1, Ala Saleh Alluhaidan1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4093-4116, 2025, DOI:10.32604/cmc.2025.059615 - 06 March 2025

    Abstract The analysis of Android malware shows that this threat is constantly increasing and is a real threat to mobile devices since traditional approaches, such as signature-based detection, are no longer effective due to the continuously advancing level of sophistication. To resolve this problem, efficient and flexible malware detection tools are needed. This work examines the possibility of employing deep CNNs to detect Android malware by transforming network traffic into image data representations. Moreover, the dataset used in this study is the CIC-AndMal2017, which contains 20,000 instances of network traffic across five distinct malware categories: a.… More >

  • Open Access

    ARTICLE

    From Detection to Explanation: Integrating Temporal and Spatial Features for Rumor Detection and Explaining Results Using LLMs

    Nanjiang Zhong*, Xinchen Jiang, Yuan Yao

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4741-4757, 2025, DOI:10.32604/cmc.2025.059536 - 06 March 2025

    Abstract The proliferation of rumors on social media has caused serious harm to society. Although previous research has attempted to use deep learning methods for rumor detection, they did not simultaneously consider the two key features of temporal and spatial domains. More importantly, these methods struggle to automatically generate convincing explanations for the detection results, which is crucial for preventing the further spread of rumors. To address these limitations, this paper proposes a novel method that integrates both temporal and spatial features while leveraging Large Language Models (LLMs) to automatically generate explanations for the detection results.… More >

  • Open Access

    ARTICLE

    Image Copy-Move Forgery Detection and Localization Method Based on Sequence-to-Sequence Transformer Structure

    Gang Hao, Peng Liang*, Ziyuan Li, Huimin Zhao, Hong Zhang

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5221-5238, 2025, DOI:10.32604/cmc.2025.055739 - 06 March 2025

    Abstract In recent years, the detection of image copy-move forgery (CMFD) has become a critical challenge in verifying the authenticity of digital images, particularly as image manipulation techniques evolve rapidly. While deep convolutional neural networks (DCNNs) have been widely employed for CMFD tasks, they are often hindered by a notable limitation: the progressive reduction in spatial resolution during the encoding process, which leads to the loss of critical image details. These details are essential for the accurate detection and localization of image copy-move forgery. To overcome the limitations of existing methods, this paper proposes a Transformer-based… More >

  • Open Access

    ARTICLE

    SGP-GCN: A Spatial-Geological Perception Graph Convolutional Neural Network for Long-Term Petroleum Production Forecasting

    Xin Liu1,*, Meng Sun1, Bo Lin2, Shibo Gu1

    Energy Engineering, Vol.122, No.3, pp. 1053-1072, 2025, DOI:10.32604/ee.2025.060489 - 07 March 2025

    Abstract Long-term petroleum production forecasting is essential for the effective development and management of oilfields. Due to its ability to extract complex patterns, deep learning has gained popularity for production forecasting. However, existing deep learning models frequently overlook the selective utilization of information from other production wells, resulting in suboptimal performance in long-term production forecasting across multiple wells. To achieve accurate long-term petroleum production forecast, we propose a spatial-geological perception graph convolutional neural network (SGP-GCN) that accounts for the temporal, spatial, and geological dependencies inherent in petroleum production. Utilizing the attention mechanism, the SGP-GCN effectively captures… More >

  • Open Access

    ARTICLE

    Improving Fundus Detection Precision in Diabetic Retinopathy Using Derivative-Based Deep Neural Networks

    Asma Aldrees1, Hong Min2,*, Ashit Kumar Dutta3, Yousef Ibrahim Daradkeh4, Mohd Anjum5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2487-2511, 2025, DOI:10.32604/cmes.2025.061103 - 03 March 2025

    Abstract Fundoscopic diagnosis involves assessing the proper functioning of the eye’s nerves, blood vessels, retinal health, and the impact of diabetes on the optic nerves. Fundus disorders are a major global health concern, affecting millions of people worldwide due to their widespread occurrence. Fundus photography generates machine-based eye images that assist in diagnosing and treating ocular diseases such as diabetic retinopathy. As a result, accurate fundus detection is essential for early diagnosis and effective treatment, helping to prevent severe complications and improve patient outcomes. To address this need, this article introduces a Derivative Model for Fundus… More >

  • Open Access

    ARTICLE

    Semantic Malware Classification Using Artificial Intelligence Techniques

    Eliel Martins1, Javier Bermejo Higuera2,*, Ricardo Sant’Ana1, Juan Ramón Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, Diego Piedrahita Castillo3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3031-3067, 2025, DOI:10.32604/cmes.2025.061080 - 03 March 2025

    Abstract The growing threat of malware, particularly in the Portable Executable (PE) format, demands more effective methods for detection and classification. Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance. This research applies deep learning to malware detection, using Convolutional Neural Network (CNN) architectures adapted to work with semantically extracted data to classify malware into malware families. Starting from the Malconv model, this study introduces modifications to adapt it to multi-classification tasks and improve its performance. It proposes a new innovative method that focuses on byte More >

Displaying 21-30 on page 3 of 422. Per Page