Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    REVIEW

    Artificial Intelligence-Enabled Chatbots in Mental Health: A Systematic Review

    Batyrkhan Omarov1,*, Sergazi Narynov2, Zhandos Zhumanov2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5105-5122, 2023, DOI:10.32604/cmc.2023.034655

    Abstract Clinical applications of Artificial Intelligence (AI) for mental health care have experienced a meteoric rise in the past few years. AI-enabled chatbot software and applications have been administering significant medical treatments that were previously only available from experienced and competent healthcare professionals. Such initiatives, which range from “virtual psychiatrists” to “social robots” in mental health, strive to improve nursing performance and cost management, as well as meeting the mental health needs of vulnerable and underserved populations. Nevertheless, there is still a substantial gap between recent progress in AI mental health and the widespread use of these solutions by healthcare practitioners… More >

  • Open Access

    ARTICLE

    Squirrel Search Optimization with Deep Convolutional Neural Network for Human Pose Estimation

    K. Ishwarya, A. Alice Nithya*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6081-6099, 2023, DOI:10.32604/cmc.2023.034654

    Abstract Human pose estimation (HPE) is a procedure for determining the structure of the body pose and it is considered a challenging issue in the computer vision (CV) communities. HPE finds its applications in several fields namely activity recognition and human-computer interface. Despite the benefits of HPE, it is still a challenging process due to the variations in visual appearances, lighting, occlusions, dimensionality, etc. To resolve these issues, this paper presents a squirrel search optimization with a deep convolutional neural network for HPE (SSDCNN-HPE) technique. The major intention of the SSDCNN-HPE technique is to identify the human pose accurately and efficiently.… More >

  • Open Access

    ARTICLE

    Research on Federated Learning Data Sharing Scheme Based on Differential Privacy

    Lihong Guo*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5069-5085, 2023, DOI:10.32604/cmc.2023.034571

    Abstract To realize data sharing, and to fully use the data value, breaking the data island between institutions to realize data collaboration has become a new sharing mode. This paper proposed a distributed data security sharing scheme based on C/S communication mode, and constructed a federated learning architecture that uses differential privacy technology to protect training parameters. Clients do not need to share local data, and they only need to upload the trained model parameters to achieve data sharing. In the process of training, a distributed parameter update mechanism is introduced. The server is mainly responsible for issuing training commands and… More >

  • Open Access

    ARTICLE

    Severity Based Light-Weight Encryption Model for Secure Medical Information System

    Firas Abedi1, Subhi R.M. Zeebaree2, Zainab Salih Ageed3, Hayder M.A. Ghanimi4, Ahmed Alkhayyat5,*, Mohammed A.M. Sadeeq6, Sarmad Nozad Mahmood7, Ali S. Abosinnee8, Zahraa H. Kareem9, Ali Hashim Abbas10, Waleed Khaild Al-Azzawi11, Mustafa Musa Jaber12,13, Mohammed Dauwed14

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5691-5704, 2023, DOI:10.32604/cmc.2023.034435

    Abstract As the amount of medical images transmitted over networks and kept on online servers continues to rise, the need to protect those images digitally is becoming increasingly important. However, due to the massive amounts of multimedia and medical pictures being exchanged, low computational complexity techniques have been developed. Most commonly used algorithms offer very little security and require a great deal of communication, all of which add to the high processing costs associated with using them. First, a deep learning classifier is used to classify records according to the degree of concealment they require. Medical images that aren’t needed can… More >

  • Open Access

    ARTICLE

    Deep Transfer Learning Driven Automated Fall Detection for Quality of Living of Disabled Persons

    Nabil Almalki1,2, Mrim M. Alnfiai1,3, Fahd N. Al-Wesabi4, Mesfer Alduhayyem5, Anwer Mustafa Hilal6,*, Manar Ahmed Hamza6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6719-6736, 2023, DOI:10.32604/cmc.2023.034417

    Abstract Mobile communication and the Internet of Things (IoT) technologies have recently been established to collect data from human beings and the environment. The data collected can be leveraged to provide intelligent services through different applications. It is an extreme challenge to monitor disabled people from remote locations. It is because day-to-day events like falls heavily result in accidents. For a person with disabilities, a fall event is an important cause of mortality and post-traumatic complications. Therefore, detecting the fall events of disabled persons in smart homes at early stages is essential to provide the necessary support and increase their survival… More >

  • Open Access

    ARTICLE

    A Stochastic Framework for Solving the Prey-Predator Delay Differential Model of Holling Type-III

    Naret Ruttanaprommarin1, Zulqurnain Sabir2,3, Rafaél Artidoro Sandoval Núñez4, Emad Az-Zo’bi5, Wajaree Weera6, Thongchai Botmart6,*, Chantapish Zamart6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5915-5930, 2023, DOI:10.32604/cmc.2023.034362

    Abstract The current research aims to implement the numerical results for the Holling third kind of functional response delay differential model utilizing a stochastic framework based on Levenberg-Marquardt backpropagation neural networks (LVMBPNNs). The nonlinear model depends upon three dynamics, prey, predator, and the impact of the recent past. Three different cases based on the delay differential system with the Holling 3rd type of the functional response have been used to solve through the proposed LVMBPNNs solver. The statistic computing framework is provided by selecting 12%, 11%, and 77% for training, testing, and verification. Thirteen numbers of neurons have been used based… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in terms of decentralization, security, and… More >

  • Open Access

    ARTICLE

    Efficient Power Control for UAV Based on Trajectory and Game Theory

    Fadhil Mukhlif1,*, Ashraf Osman Ibrahim2, Norafida Ithnin1, Roobaea Alroobaea3, Majed Alsafyani3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5589-5606, 2023, DOI:10.32604/cmc.2023.034323

    Abstract Due to the fact that network space is becoming more limited, the implementation of ultra-dense networks (UDNs) has the potential to enhance not only network coverage but also network throughput. Unmanned Aerial Vehicle (UAV) communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes. A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article. In the IoT system, the UAV is utilised not only to determine how the resources should be… More >

  • Open Access

    ARTICLE

    Aspect Extraction Approach for Sentiment Analysis Using Keywords

    Nafees Ayub1, Muhammad Ramzan Talib1,*, Muhammad Kashif Hanif1, Muhammad Awais2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6879-6892, 2023, DOI:10.32604/cmc.2023.034214

    Abstract Sentiment Analysis deals with consumer reviews available on blogs, discussion forums, E-commerce websites, and App Store. These online reviews about products are also becoming essential for consumers and companies as well. Consumers rely on these reviews to make their decisions about products and companies are also very interested in these reviews to judge their products and services. These reviews are also a very precious source of information for requirement engineers. But companies and consumers are not very satisfied with the overall sentiment; they like fine-grained knowledge about consumer reviews. Owing to this, many researchers have developed approaches for aspect-based sentiment… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Driven Intrusion Detection in SDN-Enabled IoT Environment

    Mohammed Maray1, Haya Mesfer Alshahrani2, Khalid A. Alissa3, Najm Alotaibi4, Abdulbaset Gaddah5, Ali Meree1,6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6587-6604, 2023, DOI:10.32604/cmc.2023.034176

    Abstract In recent years, wireless networks are widely used in different domains. This phenomenon has increased the number of Internet of Things (IoT) devices and their applications. Though IoT has numerous advantages, the commonly-used IoT devices are exposed to cyber-attacks periodically. This scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic networks. The Software-Defined Networking (SDN) technique and the Machine Learning (ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT networks. The Intrusion Detection System (IDS) models can be employed to secure the SDN-enabled IoT… More >

Displaying 1071-1080 on page 108 of 5350. Per Page