Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,795)
  • Open Access

    ARTICLE

    Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries

    Alaa Alsaheel, Reem Alhassoun, Reema Alrashed, Noura Almatrafi, Noura Almallouhi, Saleh Albahli*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2461-2482, 2023, DOI:10.32604/cmc.2023.040257

    Abstract With the increasing use of deep learning technology, there is a growing concern over creating deep fake images and videos that can potentially be used for fraud. In healthcare, manipulating medical images could lead to misdiagnosis and potentially life-threatening consequences. Therefore, the primary purpose of this study is to explore the use of deep learning algorithms to detect deep fake images by solving the problem of recognizing the handling of samples of cancer and other diseases. Therefore, this research proposes a framework that leverages state-of-the-art deep convolutional neural networks (CNN) and a large dataset of authentic and deep fake medical… More >

  • Open Access

    ARTICLE

    A Task-Oriented Hybrid Cloud Architecture with Deep Cognition Mechanism for Intelligent Space

    Yongcheng Cui1, Guohui Tian1,*, Xiaochun Cheng2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1385-1408, 2023, DOI:10.32604/cmc.2023.040246

    Abstract Intelligent Space (IS) is widely regarded as a promising paradigm for improving quality of life through using service task processing. As the field matures, various state-of-the-art IS architectures have been proposed. Most of the IS architectures designed for service robots face the problems of fixed-function modules and low scalability when performing service tasks. To this end, we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture (SOA). Specifically, we first use the distributed deployment of functional modules to solve the problem of high computing resource occupancy. Then, the Socket communication interface layer is designed to improve the… More >

  • Open Access

    ARTICLE

    Explainable Artificial Intelligence-Based Model Drift Detection Applicable to Unsupervised Environments

    Yongsoo Lee, Yeeun Lee, Eungyu Lee, Taejin Lee*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1701-1719, 2023, DOI:10.32604/cmc.2023.040235

    Abstract Cybersecurity increasingly relies on machine learning (ML) models to respond to and detect attacks. However, the rapidly changing data environment makes model life-cycle management after deployment essential. Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models. However, detecting drift in unsupervised environments can be challenging. This study introduces a novel approach leveraging Shapley additive explanations (SHAP), a widely recognized explainability technique in ML, to address drift detection in unsupervised settings. The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers… More >

  • Open Access

    ARTICLE

    Predicting the Popularity of Online News Based on the Dynamic Fusion of Multiple Features

    Guohui Song1,2, Yongbin Wang1,*, Jianfei Li1, Hongbin Hu1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1621-1641, 2023, DOI:10.32604/cmc.2023.040095

    Abstract Predicting the popularity of online news is essential for news providers and recommendation systems. Time series, content and meta-feature are important features in news popularity prediction. However, there is a lack of exploration of how to integrate them effectively into a deep learning model and how effective and valuable they are to the model’s performance. This work proposes a novel deep learning model named Multiple Features Dynamic Fusion (MFDF) for news popularity prediction. For modeling time series, long short-term memory networks and attention-based convolution neural networks are used to capture long-term trends and short-term fluctuations of online news popularity. The… More >

  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT and IoT-23 datasets used IoT… More >

  • Open Access

    ARTICLE

    Fully Automated Density-Based Clustering Method

    Bilal Bataineh*, Ahmad A. Alzahrani

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1833-1851, 2023, DOI:10.32604/cmc.2023.039923

    Abstract Cluster analysis is a crucial technique in unsupervised machine learning, pattern recognition, and data analysis. However, current clustering algorithms suffer from the need for manual determination of parameter values, low accuracy, and inconsistent performance concerning data size and structure. To address these challenges, a novel clustering algorithm called the fully automated density-based clustering method (FADBC) is proposed. The FADBC method consists of two stages: parameter selection and cluster extraction. In the first stage, a proposed method extracts optimal parameters for the dataset, including the epsilon size and a minimum number of points thresholds. These parameters are then used in a… More >

  • Open Access

    ARTICLE

    Double-Layer-Optimizing Method of Hybrid Energy Storage Microgrid Based on Improved Grey Wolf Optimization

    Xianjing Zhong1, Xianbo Sun1,*, Yuhan Wu2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1599-1619, 2023, DOI:10.32604/cmc.2023.039912

    Abstract To reduce the comprehensive costs of the construction and operation of microgrids and to minimize the power fluctuations caused by randomness and intermittency in distributed generation, a double-layer optimizing configuration method of hybrid energy storage microgrid based on improved grey wolf optimization (IGWO) is proposed. Firstly, building a microgrid system containing a wind-solar power station and electric-hydrogen coupling hybrid energy storage system. Secondly, the minimum comprehensive cost of the construction and operation of the microgrid is taken as the outer objective function, and the minimum peak-to-valley of the microgrid’s daily output is taken as the inner objective function. By iterating… More >

  • Open Access

    ARTICLE

    Machine Learning-Enabled Communication Approach for the Internet of Medical Things

    Rahim Khan1,3, Abdullah Ghani1, Samia Allaoua Chelloug2,*, Mohammed Amin4, Aamir Saeed5, Jason Teo1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1569-1584, 2023, DOI:10.32604/cmc.2023.039859

    Abstract The Internet of Medical Things (IoMT) is mainly concerned with the efficient utilisation of wearable devices in the healthcare domain to manage various processes automatically, whereas machine learning approaches enable these smart systems to make informed decisions. Generally, broadcasting is used for the transmission of frames, whereas congestion, energy efficiency, and excessive load are among the common issues associated with existing approaches. In this paper, a machine learning-enabled shortest path identification scheme is presented to ensure reliable transmission of frames, especially with the minimum possible communication overheads in the IoMT network. For this purpose, the proposed scheme utilises a well-known… More >

  • Open Access

    ARTICLE

    A Deep CNN-LSTM-Based Feature Extraction for Cyber-Physical System Monitoring

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2079-2093, 2023, DOI:10.32604/cmc.2023.039683

    Abstract A potential concept that could be effective for multiple applications is a “cyber-physical system” (CPS). The Internet of Things (IoT) has evolved as a research area, presenting new challenges in obtaining valuable data through environmental monitoring. The existing work solely focuses on classifying the audio system of CPS without utilizing feature extraction. This study employs a deep learning method, CNN-LSTM, and two-way feature extraction to classify audio systems within CPS. The primary objective of this system, which is built upon a convolutional neural network (CNN) with Long Short Term Memory (LSTM), is to analyze the vocalization patterns of two different… More >

  • Open Access

    ARTICLE

    Eye-Tracking Based Autism Spectrum Disorder Diagnosis Using Chaotic Butterfly Optimization with Deep Learning Model

    Tamilvizhi Thanarajan1, Youseef Alotaibi2, Surendran Rajendran3,*, Krishnaraj Nagappan4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1995-2013, 2023, DOI:10.32604/cmc.2023.039644

    Abstract Autism spectrum disorder (ASD) can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics, like changes in behavior, social disabilities, and difficulty communicating with others. Eye tracking (ET) has become a useful method to detect ASD. One vital aspect of moral erudition is the aptitude to have common visual attention. The eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early detection. Eye-tracking data can offer insightful information about the behavior and thought processes of people with ASD, but it is important to be aware of its limitations… More >

Displaying 21-30 on page 3 of 4795. Per Page