Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (156)
  • Open Access

    ARTICLE

    Enhanced Wolf Pack Algorithm (EWPA) and Dense-kUNet Segmentation for Arterial Calcifications in Mammograms

    Afnan M. Alhassan*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2207-2223, 2024, DOI:10.32604/cmc.2024.046427

    Abstract Breast Arterial Calcification (BAC) is a mammographic decision dissimilar to cancer and commonly observed in elderly women. Thus identifying BAC could provide an expense, and be inaccurate. Recently Deep Learning (DL) methods have been introduced for automatic BAC detection and quantification with increased accuracy. Previously, classification with deep learning had reached higher efficiency, but designing the structure of DL proved to be an extremely challenging task due to overfitting models. It also is not able to capture the patterns and irregularities presented in the images. To solve the overfitting problem, an optimal feature set has… More >

  • Open Access

    ARTICLE

    Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine

    Arslan Akram1,2, Imran Khan1, Javed Rashid2,3, Mubbashar Saddique4,*, Muhammad Idrees4, Yazeed Yasin Ghadi5, Abdulmohsen Algarni6

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1311-1328, 2024, DOI:10.32604/cmc.2023.040512

    Abstract Algorithms for steganography are methods of hiding data transfers in media files. Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information, and these methods have made it feasible to handle a wide range of problems associated with image analysis. Images with little information or low payload are used by information embedding methods, but the goal of all contemporary research is to employ high-payload images for classification. To address the need for both low- and high-payload images, this work provides a machine-learning approach to steganography image classification… More >

  • Open Access

    ARTICLE

    Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks

    Nadir Omer1,*, Ahmed H. Samak2, Ahmed I. Taloba3,4, Rasha M. Abd El-Aziz3,5

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 77-95, 2024, DOI:10.32604/csse.2023.039265

    Abstract Today’s world depends on the Internet to meet all its daily needs. The usage of the Internet is growing rapidly. The world is using the Internet more frequently than ever. The hazards of harmful attacks have also increased due to the growing reliance on the Internet. Hazards to cyber security are actions taken by someone with malicious intent to steal data, destroy computer systems, or disrupt them. Due to rising cyber security concerns, cyber security has emerged as the key component in the fight against all online threats, forgeries, and assaults. A device capable of… More >

  • Open Access

    ARTICLE

    Polo-like kinase 1 as a biomarker predicts the prognosis and immunotherapy of breast invasive carcinoma patients

    JUAN SHEN1,#, WEIYU ZHANG2,3,#, QINQIN JIN2,3,#, FUYU GONG4,#, HEPING ZHANG5, HONGLIANG XU5, JIEJIE LI2,3, HUI YAO2,3, XIYA JIANG2,3, YINTING YANG2,3, LIN HONG2,3, JIE MEI2,3, YANG SONG6,*, SHUGUANG ZHOU2,3,7,*

    Oncology Research, Vol.32, No.2, pp. 339-351, 2024, DOI:10.32604/or.2023.030887

    Abstract Background: Invasive breast carcinoma (BRCA) is associated with poor prognosis and high risk of mortality. Therefore, it is critical to identify novel biomarkers for the prognostic assessment of BRCA. Methods: The expression data of polo-like kinase 1 (PLK1) in BRCA and the corresponding clinical information were extracted from TCGA and GEO databases. PLK1 expression was validated in diverse breast cancer cell lines by quantitative real-time polymerase chain reaction (qRT-PCR) and western blotting. Single sample gene set enrichment analysis (ssGSEA) was performed to evaluate immune infiltration in the BRCA microenvironment, and the random forest (RF) and… More >

  • Open Access

    ARTICLE

    Pancreatic Cancer Data Classification with Quantum Machine Learning

    Amit Saxena1, Smita Saxena2,*

    Journal of Quantum Computing, Vol.5, pp. 1-13, 2023, DOI:10.32604/jqc.2023.044555

    Abstract Quantum computing is a promising new approach to tackle the complex real-world computational problems by harnessing the power of quantum mechanics principles. The inherent parallelism and exponential computational power of quantum systems hold the potential to outpace classical counterparts in solving complex optimization problems, which are pervasive in machine learning. Quantum Support Vector Machine (QSVM) is a quantum machine learning algorithm inspired by classical Support Vector Machine (SVM) that exploits quantum parallelism to efficiently classify data points in high-dimensional feature spaces. We provide a comprehensive overview of the underlying principles of QSVM, elucidating how different… More >

  • Open Access

    ARTICLE

    Comparative Evaluation of Data Mining Algorithms in Breast Cancer

    Fuad A. M. Al-Yarimi*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 633-645, 2023, DOI:10.32604/cmc.2023.038858

    Abstract Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer. The only method to avoid breast cancer-related deaths is through early detection and treatment. The proper classification of malignancies is one of the most significant challenges in the medical industry. Due to their high precision and accuracy, machine learning techniques are extensively employed for identifying and classifying various forms of cancer. Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and… More >

  • Open Access

    ARTICLE

    Parallel Integrated Model-Driven and Data-Driven Online Transient Stability Assessment Method for Power System

    Ying Zhang1, Xiaoqing Han2, Chao Zhang1, Ying Qu1, Yang Liu1, Gengwu Zhang2,*

    Energy Engineering, Vol.120, No.11, pp. 2585-2609, 2023, DOI:10.32604/ee.2023.026816

    Abstract More and more uncertain factors in power systems and more and more complex operation modes of power systems put forward higher requirements for online transient stability assessment methods. The traditional model-driven methods have clear physical mechanisms and reliable evaluation results but the calculation process is time-consuming, while the data-driven methods have the strong fitting ability and fast calculation speed but the evaluation results lack interpretation. Therefore, it is a future development trend of transient stability assessment methods to combine these two kinds of methods. In this paper, the rate of change of the kinetic energy… More >

  • Open Access

    ARTICLE

    Sentiment Analysis Based on Performance of Linear Support Vector Machine and Multinomial Naïve Bayes Using Movie Reviews with Baseline Techniques

    Mian Muhammad Danyal1, Sarwar Shah Khan2,4, Muzammil Khan2,*, Muhammad Bilal Ghaffar1, Bilal Khan1, Muhammad Arshad3

    Journal on Big Data, Vol.5, pp. 1-18, 2023, DOI:10.32604/jbd.2023.041319

    Abstract Movies are the better source of entertainment. Every year, a great percentage of movies are released. People comment on movies in the form of reviews after watching them. Since it is difficult to read all of the reviews for a movie, summarizing all of the reviews will help make this decision without wasting time in reading all of the reviews. Opinion mining also known as sentiment analysis is the process of extracting subjective information from textual data. Opinion mining involves identifying and extracting the opinions of individuals, which can be positive, neutral, or negative. The… More >

  • Open Access

    ARTICLE

    SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management

    Ana María Peco Chacón, Isaac Segovia Ramírez, Fausto Pedro García Márquez*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2595-2608, 2023, DOI:10.32604/iasc.2023.037277

    Abstract Maintenance operations have a critical influence on power generation by wind turbines (WT). Advanced algorithms must analyze large volume of data from condition monitoring systems (CMS) to determine the actual working conditions and avoid false alarms. This paper proposes different support vector machine (SVM) algorithms for the prediction and detection of false alarms. K-Fold cross-validation (CV) is applied to evaluate the classification reliability of these algorithms. Supervisory Control and Data Acquisition (SCADA) data from an operating WT are applied to test the proposed approach. The results from the quadratic SVM showed an accuracy rate of More >

  • Open Access

    ARTICLE

    SNSVM: SqueezeNet-Guided SVM for Breast Cancer Diagnosis

    Jiaji Wang1, Muhammad Attique Khan2, Shuihua Wang1,3, Yudong Zhang1,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2201-2216, 2023, DOI:10.32604/cmc.2023.041191

    Abstract Breast cancer is a major public health concern that affects women worldwide. It is a leading cause of cancer-related deaths among women, and early detection is crucial for successful treatment. Unfortunately, breast cancer can often go undetected until it has reached advanced stages, making it more difficult to treat. Therefore, there is a pressing need for accurate and efficient diagnostic tools to detect breast cancer at an early stage. The proposed approach utilizes SqueezeNet with fire modules and complex bypass to extract informative features from mammography images. The extracted features are then utilized to train… More >

Displaying 11-20 on page 2 of 156. Per Page