Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    A Method for Classification and Evaluation of Pilot’s Mental States Based on CNN

    Qianlei Wang1,2,3,*, Zaijun Wang3, Renhe Xiong4, Xingbin Liao1,2, Xiaojun Tan5

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1999-2020, 2023, DOI:10.32604/csse.2023.034183

    Abstract How to accurately recognize the mental state of pilots is a focus in civil aviation safety. The mental state of pilots is closely related to their cognitive ability in piloting. Whether the cognitive ability meets the standard is related to flight safety. However, the pilot's working state is unique, which increases the difficulty of analyzing the pilot's mental state. In this work, we proposed a Convolutional Neural Network (CNN) that merges attention to classify the mental state of pilots through electroencephalography (EEG). Considering the individual differences in EEG, semi-supervised learning based on improved K-Means is used in the model training… More >

  • Open Access

    ARTICLE

    Using Informative Score for Instance Selection Strategy in Semi-Supervised Sentiment Classification

    Vivian Lee Lay Shan, Gan Keng Hoon*, Tan Tien Ping, Rosni Abdullah

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4801-4818, 2023, DOI:10.32604/cmc.2023.033752

    Abstract Sentiment classification is a useful tool to classify reviews about sentiments and attitudes towards a product or service. Existing studies heavily rely on sentiment classification methods that require fully annotated inputs. However, there is limited labelled text available, making the acquirement process of the fully annotated input costly and labour-intensive. Lately, semi-supervised methods emerge as they require only partially labelled input but perform comparably to supervised methods. Nevertheless, some works reported that the performance of the semi-supervised model degraded after adding unlabelled instances into training. Literature also shows that not all unlabelled instances are equally useful; thus identifying the informative… More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open Access

    ARTICLE

    Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network

    Nasir Sayed1, Muhammad Shoaib2,*, Waqas Ahmed3, Sultan Noman Qasem4, Abdullah M. Albarrak4, Faisal Saeed5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1351-1374, 2023, DOI:10.32604/cmc.2023.030831

    Abstract Due to their low power consumption and limited computing power, Internet of Things (IoT) devices are difficult to secure. Moreover, the rapid growth of IoT devices in homes increases the risk of cyber-attacks. Intrusion detection systems (IDS) are commonly employed to prevent cyberattacks. These systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate countermeasures. Attempts have been made in the past to detect new attacks using machine learning and deep learning techniques, however, these efforts have been unsuccessful. In this paper, we propose two deep learning models to automatically detect various types of intrusion… More >

  • Open Access

    ARTICLE

    Profiling Astronomical Objects Using Unsupervised Learning Approach

    Theerapat Sangpetch1, Tossapon Boongoen1,*, Natthakan Iam-On2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1641-1655, 2023, DOI:10.32604/cmc.2023.026739

    Abstract Attempts to determine characters of astronomical objects have been one of major and vibrant activities in both astronomy and data science fields. Instead of a manual inspection, various automated systems are invented to satisfy the need, including the classification of light curve profiles. A specific Kaggle competition, namely Photometric LSST Astronomical Time-Series Classification Challenge (PLAsTiCC), is launched to gather new ideas of tackling the abovementioned task using the data set collected from the Large Synoptic Survey Telescope (LSST) project. Almost all proposed methods fall into the supervised family with a common aim to categorize each object into one of pre-defined… More >

  • Open Access

    ARTICLE

    An Efficient Unsupervised Learning Approach for Detecting Anomaly in Cloud

    P. Sherubha1,*, S. P. Sasirekha2, A. Dinesh Kumar Anguraj3, J. Vakula Rani4, Raju Anitha3, S. Phani Praveen5,6, R. Hariharan Krishnan5,6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 149-166, 2023, DOI:10.32604/csse.2023.024424

    Abstract The Cloud system shows its growing functionalities in various industrial applications. The safety towards data transfer seems to be a threat where Network Intrusion Detection System (NIDS) is measured as an essential element to fulfill security. Recently, Machine Learning (ML) approaches have been used for the construction of intellectual IDS. Most IDS are based on ML techniques either as unsupervised or supervised. In supervised learning, NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack patterns. Similarly, the unsupervised model fails to provide a satisfactory outcome. Hence, to boost the functionality of… More >

  • Open Access

    ARTICLE

    Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2147-2163, 2023, DOI:10.32604/csse.2023.028227

    Abstract Android devices are popularly available in the commercial market at different price levels for various levels of customers. The Android stack is more vulnerable compared to other platforms because of its open-source nature. There are many android malware detection techniques available to exploit the source code and find associated components during execution time. To obtain a better result we create a hybrid technique merging static and dynamic processes. In this paper, in the first part, we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Multicollinearity problem is one of… More >

  • Open Access

    ARTICLE

    Drug–Target Interaction Prediction Model Using Optimal Recurrent Neural Network

    G. Kavipriya*, D. Manjula

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1675-1689, 2023, DOI:10.32604/iasc.2023.027670

    Abstract Drug-target interactions prediction (DTIP) remains an important requirement in the field of drug discovery and human medicine. The identification of interaction among the drug compound and target protein plays an essential process in the drug discovery process. It is a lengthier and complex process for predicting the drug target interaction (DTI) utilizing experimental approaches. To resolve these issues, computational intelligence based DTIP techniques were developed to offer an efficient predictive model with low cost. The recently developed deep learning (DL) models can be employed for the design of effective predictive approaches for DTIP. With this motivation, this paper presents a… More >

  • Open Access

    ARTICLE

    LBP–Bilateral Based Feature Fusion for Breast Cancer Diagnosis

    Yassir Edrees Almalki1, Maida Khalid2, Sharifa Khalid Alduraibi3, Qudsia Yousaf2, Maryam Zaffar2, Shoayea Mohessen Almutiri4, Muhammad Irfan5, Mohammad Abd Alkhalik Basha6, Alaa Khalid Alduraibi3, Abdulrahman Manaa Alamri7, Khalaf Alshamrani8, Hassan A. Alshamrani8,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4103-4121, 2022, DOI:10.32604/cmc.2022.029039

    Abstract Since reporting cases of breast cancer are on the rise all over the world. Especially in regions such as Pakistan, Saudi Arabia, and the United States. Efficient methods for the early detection and diagnosis of breast cancer are needed. The usual diagnosis procedures followed by physicians has been updated with modern diagnostic approaches that include computer-aided support for better accuracy. Machine learning based practices has increased the accuracy and efficiency of medical diagnosis, which has helped save lives of many patients. There is much research in the field of medical imaging diagnostics that can be applied to the variety of… More >

  • Open Access

    ARTICLE

    A Study on Cascade R-CNN-Based Dangerous Goods Detection Using X-Ray Image

    Sang-Hyun Lee*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4245-4260, 2022, DOI:10.32604/cmc.2022.026012

    Abstract X-ray inspection equipment is divided into small baggage inspection equipment and large cargo inspection equipment. In the case of inspection using X-ray scanning equipment, it is possible to identify the contents of goods, unauthorized transport, or hidden goods in real-time by-passing cargo through X-rays without opening it. In this paper, we propose a system for detecting dangerous objects in X-ray images using the Cascade Region-based Convolutional Neural Network (Cascade R-CNN) model, and the data used for learning consists of dangerous goods, storage media, firearms, and knives. In addition, to minimize the overfitting problem caused by the lack of data to… More >

Displaying 11-20 on page 2 of 60. Per Page