Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,737)
  • Open Access

    ARTICLE

    Cost-Sensitive Dual-Stream Residual Networks for Imbalanced Classification

    Congcong Ma1,2, Jiaqi Mi1, Wanlin Gao1,2, Sha Tao1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4243-4261, 2024, DOI:10.32604/cmc.2024.054506

    Abstract Imbalanced data classification is the task of classifying datasets where there is a significant disparity in the number of samples between different classes. This task is prevalent in practical scenarios such as industrial fault diagnosis, network intrusion detection, cancer detection, etc. In imbalanced classification tasks, the focus is typically on achieving high recognition accuracy for the minority class. However, due to the challenges presented by imbalanced multi-class datasets, such as the scarcity of samples in minority classes and complex inter-class relationships with overlapping boundaries, existing methods often do not perform well in multi-class imbalanced data… More >

  • Open Access

    ARTICLE

    Metaheuristic-Driven Two-Stage Ensemble Deep Learning for Lung/Colon Cancer Classification

    Pouyan Razmjouei1, Elaheh Moharamkhani2, Mohamad Hasanvand3, Maryam Daneshfar4, Mohammad Shokouhifar5,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3855-3880, 2024, DOI:10.32604/cmc.2024.054460

    Abstract This study investigates the application of deep learning, ensemble learning, metaheuristic optimization, and image processing techniques for detecting lung and colon cancers, aiming to enhance treatment efficacy and improve survival rates. We introduce a metaheuristic-driven two-stage ensemble deep learning model for efficient lung/colon cancer classification. The diagnosis of lung and colon cancers is attempted using several unique indicators by different versions of deep Convolutional Neural Networks (CNNs) in feature extraction and model constructions, and utilizing the power of various Machine Learning (ML) algorithms for final classification. Specifically, we consider different scenarios consisting of two-class colon… More >

  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking

    Cong Shen1,*, Wei Zhang1,2,*, Tanping Zhou1,2, Yiming Zhang1, Lingling Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4729-4748, 2024, DOI:10.32604/cmc.2024.054434

    Abstract With the increasing awareness of privacy protection and the improvement of relevant laws, federal learning has gradually become a new choice for cross-agency and cross-device machine learning. In order to solve the problems of privacy leakage, high computational overhead and high traffic in some federated learning schemes, this paper proposes a multiplicative double privacy mask algorithm which is convenient for homomorphic addition aggregation. The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants. At the same time, the proposed TQRR (Top-Q-Random-R) More >

  • Open Access

    ARTICLE

    Improving Prediction Efficiency of Machine Learning Models for Cardiovascular Disease in IoST-Based Systems through Hyperparameter Optimization

    Tajim Md. Niamat Ullah Akhund1,2,*, Waleed M. Al-Nuwaiser3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3485-3506, 2024, DOI:10.32604/cmc.2024.054222

    Abstract This study explores the impact of hyperparameter optimization on machine learning models for predicting cardiovascular disease using data from an IoST (Internet of Sensing Things) device. Ten distinct machine learning approaches were implemented and systematically evaluated before and after hyperparameter tuning. Significant improvements were observed across various models, with SVM and Neural Networks consistently showing enhanced performance metrics such as F1-Score, recall, and precision. The study underscores the critical role of tailored hyperparameter tuning in optimizing these models, revealing diverse outcomes among algorithms. Decision Trees and Random Forests exhibited stable performance throughout the evaluation. While More >

  • Open Access

    ARTICLE

    Enhanced Mechanism for Link Failure Rerouting in Software-Defined Exchange Point Networks

    Abdijalil Abdullahi1,2, Selvakumar Manickam2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4361-4385, 2024, DOI:10.32604/cmc.2024.054215

    Abstract Internet Exchange Point (IXP) is a system that increases network bandwidth performance. Internet exchange points facilitate interconnection among network providers, including Internet Service Providers (ISPs) and Content Delivery Providers (CDNs). To improve service management, Internet exchange point providers have adopted the Software Defined Network (SDN) paradigm. This implementation is known as a Software-Defined Exchange Point (SDX). It improves network providers’ operations and management. However, performance issues still exist, particularly with multi-hop topologies. These issues include switch memory costs, packet processing latency, and link failure recovery delays. The paper proposes Enhanced Link Failure Rerouting (ELFR), an… More >

  • Open Access

    ARTICLE

    A Lightweight Intrusion Detection System Using Convolutional Neural Network and Long Short-Term Memory in Fog Computing

    Hawazen Alzahrani1, Tarek Sheltami1, Abdulaziz Barnawi2, Muhammad Imam2,*, Ansar Yaser3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4703-4728, 2024, DOI:10.32604/cmc.2024.054203

    Abstract The Internet of Things (IoT) links various devices to digital services and significantly improves the quality of our lives. However, as IoT connectivity is growing rapidly, so do the risks of network vulnerabilities and threats. Many interesting Intrusion Detection Systems (IDSs) are presented based on machine learning (ML) techniques to overcome this problem. Given the resource limitations of fog computing environments, a lightweight IDS is essential. This paper introduces a hybrid deep learning (DL) method that combines convolutional neural networks (CNN) and long short-term memory (LSTM) to build an energy-aware, anomaly-based IDS. We test this… More >

  • Open Access

    ARTICLE

    Ghost-YOLO v8: An Attention-Guided Enhanced Small Target Detection Algorithm for Floating Litter on Water Surfaces

    Zhongmin Huangfu, Shuqing Li*, Luoheng Yan

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3713-3731, 2024, DOI:10.32604/cmc.2024.054188

    Abstract Addressing the challenges in detecting surface floating litter in artificial lakes, including complex environments, uneven illumination, and susceptibility to noise and weather, this paper proposes an efficient and lightweight Ghost-YOLO (You Only Look Once) v8 algorithm. The algorithm integrates advanced attention mechanisms and a small-target detection head to significantly enhance detection performance and efficiency. Firstly, an SE (Squeeze-and-Excitation) mechanism is incorporated into the backbone network to fortify the extraction of resilient features and precise target localization. This mechanism models feature channel dependencies, enabling adaptive adjustment of channel importance, thereby improving recognition of floating litter targets.… More >

  • Open Access

    REVIEW

    A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era

    Abdullah Alabdulatif1, Navod Neranjan Thilakarathne2,*, Zaharaddeen Karami Lawal3,4,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3917-3943, 2024, DOI:10.32604/cmc.2024.054150

    Abstract The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems (CPSs) seamlessly integrate physical processes with advanced digital technologies. However, as industries become increasingly interconnected and reliant on smart digital technologies, the intersection of physical and cyber domains introduces novel security considerations, endangering the entire industrial ecosystem. The transition towards a more cooperative setting, including humans and machines in Industry 5.0, together with the growing intricacy and interconnection of CPSs, presents distinct and diverse security and privacy challenges. In this regard, this study provides a comprehensive review of security and privacy concerns pertaining… More >

  • Open Access

    ARTICLE

    A Quarterly High RFM Mining Algorithm for Big Data Management

    Cuiwei Peng1, Jiahui Chen2,*, Shicheng Wan3, Guotao Xu4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4341-4360, 2024, DOI:10.32604/cmc.2024.054109

    Abstract In today’s highly competitive retail industry, offline stores face increasing pressure on profitability. They hope to improve their ability in shelf management with the help of big data technology. For this, on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior. RFM (recency, frequency, and monetary) pattern mining is a powerful tool to evaluate the value of customer behavior. However, the existing RFM pattern mining algorithms do not consider the quarterly nature of goods, resulting in unreasonable shelf availability and difficulty in profit-making. To solve this problem, we… More >

Displaying 31-40 on page 4 of 5737. Per Page