Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (110)
  • Open Access

    ARTICLE

    Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment

    Saeed M. Alshahrani1, Jameel Almalki2, Waleed Alshehri2, Rashid Mehmood3, Marwan Albahar2, Najlaa Jannah2, Nayyar Ahmed Khan1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1793-1817, 2023, DOI:10.32604/csse.2023.039648

    Abstract Artificial Intelligence (AI) has gained popularity for the containment of COVID-19 pandemic applications. Several AI techniques provide efficient mechanisms for handling pandemic situations. AI methods, protocols, data sets, and various validation mechanisms empower the users towards proper decision-making and procedures to handle the situation. Despite so many tools, there still exist conditions in which AI must go a long way. To increase the adaptability and potential of these techniques, a combination of AI and Bigdata is currently gaining popularity. This paper surveys and analyzes the methods within the various computational paradigms used by different researchers and national governments, such as… More >

  • Open Access

    REVIEW

    A Survey on Acute Leukemia Expression Data Classification Using Ensembles

    Abdel Nasser H. Zaied1, Ehab Rushdy2, Mona Gamal3,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1349-1364, 2023, DOI:10.32604/csse.2023.033596

    Abstract Acute leukemia is an aggressive disease that has high mortality rates worldwide. The error rate can be as high as 40% when classifying acute leukemia into its subtypes. So, there is an urgent need to support hematologists during the classification process. More than two decades ago, researchers used microarray gene expression data to classify cancer and adopted acute leukemia as a test case. The high classification accuracy they achieved confirmed that it is possible to classify cancer subtypes using microarray gene expression data. Ensemble machine learning is an effective method that combines individual classifiers to classify new samples. Ensemble classifiers… More >

  • Open Access

    ARTICLE

    Survey of Resources Allocation Techniques with a Quality of Service (QoS) Aware in a Fog Computing Environment

    Wan Norsyafizan W. Muhamad1, Kaharudin Dimyati2, Muhammad Awais Javed3, Suzi Seroja Sarnin1,*, Divine Senanu Ametefe1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1291-1308, 2023, DOI:10.32604/cmc.2023.037214

    Abstract The tremendous advancement in distributed computing and Internet of Things (IoT) applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud computing. Thus, suitable and effective applications could be performed to satisfy the applications’ latency requirement. Resource allocation techniques are essential aspects of fog networks which prevent unbalanced load distribution. Effective resource management techniques can improve the quality of service metrics. Due to the limited and heterogeneous resources available within the fog infrastructure, the fog layer’s resources need to be optimised to efficiently manage and distribute them to different applications within the IoT network.… More >

  • Open Access

    ARTICLE

    Survey on Segmentation and Classification Techniques of Satellite Images by Deep Learning Algorithm

    Atheer Joudah1,*, Souheyl Mallat2, Mounir Zrigui1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4973-4984, 2023, DOI:10.32604/cmc.2023.036483

    Abstract This survey paper aims to show methods to analyze and classify field satellite images using deep learning and machine learning algorithms. Users of deep learning-based Convolutional Neural Network (CNN) technology to harvest fields from satellite images or generate zones of interest were among the planned application scenarios (ROI). Using machine learning, the satellite image is placed on the input image, segmented, and then tagged. In contemporary categorization, field size ratio, Local Binary Pattern (LBP) histograms, and color data are taken into account. Field satellite image localization has several practical applications, including pest management, scene analysis, and field tracking. The relationship… More >

  • Open Access

    REVIEW

    Technologies Behind the Smart Grid and Internet of Things: A System Survey

    Kuldeep Sharma1, Arun Malik1, Isha Batra1, A. S. M. Sanwar Hosen2, Md Abdul Latif Sarker3, Dong Seog Han4,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5049-5072, 2023, DOI:10.32604/cmc.2023.035638

    Abstract Electric smart grids enable a bidirectional flow of electricity and information among power system assets. For proper monitoring and controlling of power quality, reliability, scalability and flexibility, there is a need for an environmentally friendly system that is transparent, sustainable, cost-saving, energy-efficient, agile and secure. This paper provides an overview of the emerging technologies behind smart grids and the internet of things. The dependent variables are identified by analyzing the electricity consumption patterns for optimal utilization and planning preventive maintenance of their legacy assets like power distribution transformers with real-time parameters to ensure an uninterrupted and reliable power supply. In… More >

  • Open Access

    REVIEW

    A Survey on Artificial Intelligence in Posture Recognition

    Xiaoyan Jiang1,2, Zuojin Hu1, Shuihua Wang2, Yudong Zhang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 35-82, 2023, DOI:10.32604/cmes.2023.027676

    Abstract Over the years, the continuous development of new technology has promoted research in the field of posture recognition and also made the application field of posture recognition have been greatly expanded. The purpose of this paper is to introduce the latest methods of posture recognition and review the various techniques and algorithms of posture recognition in recent years, such as scale-invariant feature transform, histogram of oriented gradients, support vector machine (SVM), Gaussian mixture model, dynamic time warping, hidden Markov model (HMM), lightweight network, convolutional neural network (CNN). We also investigate improved methods of CNN, such as stacked hourglass networks, multi-stage… More >

  • Open Access

    REVIEW

    Heterogeneous Network Embedding: A Survey

    Sufen Zhao1,2, Rong Peng1,*, Po Hu2, Liansheng Tan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 83-130, 2023, DOI:10.32604/cmes.2023.024781

    Abstract Real-world complex networks are inherently heterogeneous; they have different types of nodes, attributes, and relationships. In recent years, various methods have been proposed to automatically learn how to encode the structural and semantic information contained in heterogeneous information networks (HINs) into low-dimensional embeddings; this task is called heterogeneous network embedding (HNE). Efficient HNE techniques can benefit various HIN-based machine learning tasks such as node classification, recommender systems, and information retrieval. Here, we provide a comprehensive survey of key advancements in the area of HNE. First, we define an encoder-decoder-based HNE model taxonomy. Then, we systematically overview, compare, and summarize various… More > Graphic Abstract

    Heterogeneous Network Embedding: A Survey

  • Open Access

    REVIEW

    A Survey of GAN Based Image Synthesis

    Jiahe Ni*

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 79-88, 2022, DOI:10.32604/jihpp.2022.039751

    Abstract Image generation is a hot topic in the academic recently, and has been applied to AI drawing, which can bring Vivid AI paintings without labor costs. In image generation, we represent the image as a random vector, assuming that the images of the natural scene obey an unknown distribution, we hope to estimate its distribution through some observation samples. Especially, with the development of GAN (Generative Adversarial Network), The generator and discriminator improve the model capability through adversarial, the quality of the generated image is also increasing. The image quality generated by the existing GAN based image generation model is… More >

  • Open Access

    REVIEW

    A Survey of Privacy Preservation for Deep Learning Applications

    Ling Zhang1,*, Lina Nie1, Leyan Yu2

    Journal of Information Hiding and Privacy Protection, Vol.4, No.2, pp. 69-78, 2022, DOI:10.32604/jihpp.2022.039284

    Abstract Deep learning is widely used in artificial intelligence fields such as computer vision, natural language recognition, and intelligent robots. With the development of deep learning, people’s expectations for this technology are increasing daily. Enterprises and individuals usually need a lot of computing power to support the practical work of deep learning technology. Many cloud service providers provide and deploy cloud computing environments. However, there are severe risks of privacy leakage when transferring data to cloud service providers and using data for model training, which makes users unable to use deep learning technology in cloud computing environments confidently. This paper mainly… More >

  • Open Access

    REVIEW

    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and… More >

Displaying 21-30 on page 3 of 110. Per Page