Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (520)
  • Open Access

    ARTICLE

    PoIR: A Node Selection Mechanism in Reputation-Based Blockchain Consensus Using Bidirectional LSTM Regression Model

    Jauzak Hussaini Windiatmaja, Delphi Hanggoro, Muhammad Salman, Riri Fitri Sari*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2309-2339, 2023, DOI:10.32604/cmc.2023.041152 - 29 November 2023

    Abstract This research presents a reputation-based blockchain consensus mechanism called Proof of Intelligent Reputation (PoIR) as an alternative to traditional Proof of Work (PoW). PoIR addresses the limitations of existing reputation-based consensus mechanisms by proposing a more decentralized and fair node selection process. The proposed PoIR consensus combines Bidirectional Long Short-Term Memory (BiLSTM) with the Network Entity Reputation Database (NERD) to generate reputation scores for network entities and select authoritative nodes. NERD records network entity profiles based on various sources, i.e., Warden, Blacklists, DShield, AlienVault Open Threat Exchange (OTX), and MISP (Malware Information Sharing Platform). It… More >

  • Open Access

    ARTICLE

    Diagnosis of Autism Spectrum Disorder by Imperialistic Competitive Algorithm and Logistic Regression Classifier

    Shabana R. Ziyad1,*, Liyakathunisa2, Eman Aljohani2, I. A. Saeed3

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1515-1534, 2023, DOI:10.32604/cmc.2023.040874 - 29 November 2023

    Abstract Autism spectrum disorder (ASD), classified as a developmental disability, is now more common in children than ever. A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection of autism in children. Parents can seek professional help for a better prognosis of the child’s therapy when ASD is diagnosed under five years. This research study aims to develop an automated tool for diagnosing autism in children. The computer-aided diagnosis tool for ASD detection is designed and developed by a novel methodology that includes data acquisition, feature selection, and classification phases.… More >

  • Open Access

    ARTICLE

    Chimp Optimization Algorithm Based Feature Selection with Machine Learning for Medical Data Classification

    Firas Abedi1, Hayder M. A. Ghanimi2, Abeer D. Algarni3, Naglaa F. Soliman3,*, Walid El-Shafai4,5, Ali Hashim Abbas6, Zahraa H. Kareem7, Hussein Muhi Hariz8, Ahmed Alkhayyat9

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2791-2814, 2023, DOI:10.32604/csse.2023.038762 - 09 November 2023

    Abstract Data mining plays a crucial role in extracting meaningful knowledge from large-scale data repositories, such as data warehouses and databases. Association rule mining, a fundamental process in data mining, involves discovering correlations, patterns, and causal structures within datasets. In the healthcare domain, association rules offer valuable opportunities for building knowledge bases, enabling intelligent diagnoses, and extracting invaluable information rapidly. This paper presents a novel approach called the Machine Learning based Association Rule Mining and Classification for Healthcare Data Management System (MLARMC-HDMS). The MLARMC-HDMS technique integrates classification and association rule mining (ARM) processes. Initially, the chimp… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Stacked Auto-Encoder with Dynamic Differential Annealed Optimization for Skin Lesion Diagnosis

    Ahmad Alassaf*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2773-2789, 2023, DOI:10.32604/csse.2023.035899 - 09 November 2023

    Abstract Intelligent diagnosis approaches with shallow architectural models play an essential role in healthcare. Deep Learning (DL) models with unsupervised learning concepts have been proposed because high-quality feature extraction and adequate labelled details significantly influence shallow models. On the other hand, skin lesion-based segregation and disintegration procedures play an essential role in earlier skin cancer detection. However, artefacts, an unclear boundary, poor contrast, and different lesion sizes make detection difficult. To address the issues in skin lesion diagnosis, this study creates the UDLS-DDOA model, an intelligent Unsupervised Deep Learning-based Stacked Auto-encoder (UDLS) optimized by Dynamic Differential… More >

  • Open Access

    ARTICLE

    Automated Pavement Crack Detection Using Deep Feature Selection and Whale Optimization Algorithm

    Shorouq Alshawabkeh, Li Wu*, Daojun Dong, Yao Cheng, Liping Li, Mohammad Alanaqreh

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 63-77, 2023, DOI:10.32604/cmc.2023.042183 - 31 October 2023

    Abstract Pavement crack detection plays a crucial role in ensuring road safety and reducing maintenance expenses. Recent advancements in deep learning (DL) techniques have shown promising results in detecting pavement cracks; however, the selection of relevant features for classification remains challenging. In this study, we propose a new approach for pavement crack detection that integrates deep learning for feature extraction, the whale optimization algorithm (WOA) for feature selection, and random forest (RF) for classification. The performance of the models was evaluated using accuracy, recall, precision, F1 score, and area under the receiver operating characteristic curve (AUC).… More >

  • Open Access

    ARTICLE

    Modified MMS: Minimization Approach for Model Subset Selection

    C. Rajathi, P. Rukmani*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 733-756, 2023, DOI:10.32604/cmc.2023.041507 - 31 October 2023

    Abstract Considering the recent developments in the digital environment, ensuring a higher level of security for networking systems is imperative. Many security approaches are being constantly developed to protect against evolving threats. An ensemble model for the intrusion classification system yielded promising results based on the knowledge of many prior studies. This research work aimed to create a more diverse and effective ensemble model. To this end, selected six classification models, Logistic Regression (LR), Naive Bayes (NB), K-Nearest Neighbor (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Random Forest (RF) from existing study to run… More >

  • Open Access

    ARTICLE

    Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line

    Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627 - 08 October 2023

    Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming,… More >

  • Open Access

    ARTICLE

    An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection

    Hui Xu, Yalin Hu*, Weidong Cao, Longjie Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3239-3255, 2023, DOI:10.32604/cmc.2023.039227 - 08 October 2023

    Abstract The massive influx of traffic on the Internet has made the composition of web traffic increasingly complex. Traditional port-based or protocol-based network traffic identification methods are no longer suitable for today’s complex and changing networks. Recently, machine learning has been widely applied to network traffic recognition. Still, high-dimensional features and redundant data in network traffic can lead to slow convergence problems and low identification accuracy of network traffic recognition algorithms. Taking advantage of the faster optimization-seeking capability of the jumping spider optimization algorithm (JSOA), this paper proposes a jumping spider optimization algorithm that incorporates the… More >

  • Open Access

    ARTICLE

    CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification

    Mehwish Zafar1, Javeria Amin2, Muhammad Sharif1, Muhammad Almas Anjum3, Seifedine Kadry4,5,6, Jungeun Kim7,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2779-2793, 2023, DOI:10.32604/cmc.2023.035860 - 08 October 2023

    Abstract Worldwide cotton is the most profitable cash crop. Each year the production of this crop suffers because of several diseases. At an early stage, computerized methods are used for disease detection that may reduce the loss in the production of cotton. Although several methods are proposed for the detection of cotton diseases, however, still there are limitations because of low-quality images, size, shape, variations in orientation, and complex background. Due to these factors, there is a need for novel methods for features extraction/selection for the accurate cotton disease classification. Therefore in this research, an optimized… More >

  • Open Access

    ARTICLE

    Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning

    Shuangxing Deng, Man Li*, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2919-2939, 2023, DOI:10.32604/iasc.2023.039985 - 11 September 2023

    Abstract Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic… More >

Displaying 81-90 on page 9 of 520. Per Page