Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (150)
  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches

    Jungpil Shin1,*, Md. Al Mehedi Hasan2, Md. Maniruzzaman1, Taiki Watanabe1, Issei Jozume1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1205-1222, 2024, DOI:10.32604/cmc.2024.046954

    Abstract Person identification is one of the most vital tasks for network security. People are more concerned about their security due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, fingerprints and faces have been widely used for person identification, which has the risk of information leakage as a result of reproducing fingers or faces by taking a snapshot. Recently, people have focused on creating an identifiable pattern, which will not be reproducible falsely by capturing psychological and behavioral information of a person using vision and sensor-based techniques. In existing studies, most of the researchers used very… More >

  • Open Access

    ARTICLE

    Differentially Private Support Vector Machines with Knowledge Aggregation

    Teng Wang, Yao Zhang, Jiangguo Liang, Shuai Wang, Shuanggen Liu*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3891-3907, 2024, DOI:10.32604/cmc.2024.048115

    Abstract With the widespread data collection and processing, privacy-preserving machine learning has become increasingly important in addressing privacy risks related to individuals. Support vector machine (SVM) is one of the most elementary learning models of machine learning. Privacy issues surrounding SVM classifier training have attracted increasing attention. In this paper, we investigate Differential Privacy-compliant Federated Machine Learning with Dimensionality Reduction, called FedDPDR-DPML, which greatly improves data utility while providing strong privacy guarantees. Considering in distributed learning scenarios, multiple participants usually hold unbalanced or small amounts of data. Therefore, FedDPDR-DPML enables multiple participants to collaboratively learn a global model based on weighted… More >

  • Open Access

    ARTICLE

    DeepSVDNet: A Deep Learning-Based Approach for Detecting and Classifying Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images

    Anas Bilal1, Azhar Imran2, Talha Imtiaz Baig3,4, Xiaowen Liu1,*, Haixia Long1, Abdulkareem Alzahrani5, Muhammad Shafiq6

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 511-528, 2024, DOI:10.32604/csse.2023.039672

    Abstract Artificial Intelligence (AI) is being increasingly used for diagnosing Vision-Threatening Diabetic Retinopathy (VTDR), which is a leading cause of visual impairment and blindness worldwide. However, previous automated VTDR detection methods have mainly relied on manual feature extraction and classification, leading to errors. This paper proposes a novel VTDR detection and classification model that combines different models through majority voting. Our proposed methodology involves preprocessing, data augmentation, feature extraction, and classification stages. We use a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model for feature extraction and selection and an improved SVM-RBF with a Decision Tree (DT) and K-Nearest Neighbor (KNN)… More >

  • Open Access

    ARTICLE

    Enhanced Wolf Pack Algorithm (EWPA) and Dense-kUNet Segmentation for Arterial Calcifications in Mammograms

    Afnan M. Alhassan*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2207-2223, 2024, DOI:10.32604/cmc.2024.046427

    Abstract Breast Arterial Calcification (BAC) is a mammographic decision dissimilar to cancer and commonly observed in elderly women. Thus identifying BAC could provide an expense, and be inaccurate. Recently Deep Learning (DL) methods have been introduced for automatic BAC detection and quantification with increased accuracy. Previously, classification with deep learning had reached higher efficiency, but designing the structure of DL proved to be an extremely challenging task due to overfitting models. It also is not able to capture the patterns and irregularities presented in the images. To solve the overfitting problem, an optimal feature set has been formed by Enhanced Wolf… More >

  • Open Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512

    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to… More >

  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 77-95, 2024, DOI:10.32604/csse.2023.039265

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of identifying network irregularities and cyber-attacks… More >

  • Open Access

    ARTICLE

    Polo-like kinase 1 as a biomarker predicts the prognosis and immunotherapy of breast invasive carcinoma patients

    JUAN SHEN1,#, WEIYU ZHANG2,3,#, QINQIN JIN2,3,#, FUYU GONG4,#, HEPING ZHANG5, HONGLIANG XU5, JIEJIE LI2,3, HUI YAO2,3, XIYA JIANG2,3, YINTING YANG2,3, LIN HONG2,3, JIE MEI2,3, YANG SONG6,*, SHUGUANG ZHOU2,3,7,*

    Oncology Research, Vol.32, No.2, pp. 339-351, 2024, DOI:10.32604/or.2023.030887

    Abstract Background: Invasive breast carcinoma (BRCA) is associated with poor prognosis and high risk of mortality. Therefore, it is critical to identify novel biomarkers for the prognostic assessment of BRCA. Methods: The expression data of polo-like kinase 1 (PLK1) in BRCA and the corresponding clinical information were extracted from TCGA and GEO databases. PLK1 expression was validated in diverse breast cancer cell lines by quantitative real-time polymerase chain reaction (qRT-PCR) and western blotting. Single sample gene set enrichment analysis (ssGSEA) was performed to evaluate immune infiltration in the BRCA microenvironment, and the random forest (RF) and support vector machine (SVM) algorithms… More >

  • Open Access

    ARTICLE

    Pancreatic Cancer Data Classification with Quantum Machine Learning

    Amit Saxena1, Smita Saxena2,*

    Journal of Quantum Computing, Vol.5, pp. 1-13, 2023, DOI:10.32604/jqc.2023.044555

    Abstract Quantum computing is a promising new approach to tackle the complex real-world computational problems by harnessing the power of quantum mechanics principles. The inherent parallelism and exponential computational power of quantum systems hold the potential to outpace classical counterparts in solving complex optimization problems, which are pervasive in machine learning. Quantum Support Vector Machine (QSVM) is a quantum machine learning algorithm inspired by classical Support Vector Machine (SVM) that exploits quantum parallelism to efficiently classify data points in high-dimensional feature spaces. We provide a comprehensive overview of the underlying principles of QSVM, elucidating how different quantum feature maps and quantum… More >

  • Open Access

    ARTICLE

    Comparative Evaluation of Data Mining Algorithms in Breast Cancer

    Fuad A. M. Al-Yarimi*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 633-645, 2023, DOI:10.32604/cmc.2023.038858

    Abstract Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer. The only method to avoid breast cancer-related deaths is through early detection and treatment. The proper classification of malignancies is one of the most significant challenges in the medical industry. Due to their high precision and accuracy, machine learning techniques are extensively employed for identifying and classifying various forms of cancer. Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for… More >

Displaying 1-10 on page 1 of 150. Per Page