Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (366)
  • Open Access

    ARTICLE

    Data Fusion Architecture Empowered with Deep Learning for Breast Cancer Classification

    Sahar Arooj1, Muhammad Farhan Khan2, Tariq Shahzad3, Muhammad Adnan Khan4,5,6, Muhammad Umar Nasir7, Muhammad Zubair1, Atta-ur-Rahman8, Khmaies Ouahada3,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.043013

    Abstract Breast cancer (BC) is the most widespread tumor in females worldwide and is a severe public health issue. BC is the leading reason of death affecting females between the ages of 20 to 59 around the world. Early detection and therapy can help women receive effective treatment and, as a result, decrease the rate of breast cancer disease. The cancer tumor develops when cells grow improperly and attack the healthy tissue in the human body. Tumors are classified as benign or malignant, and the absence of cancer in the breast is considered normal. Deep learning, machine learning, and transfer learning… More >

  • Open Access

    ARTICLE

    Optimizing Fully Convolutional Encoder-Decoder Network for Segmentation of Diabetic Eye Disease

    Abdul Qadir Khan1, Guangmin Sun1,*, Yu Li1, Anas Bilal2, Malik Abdul Manan1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.043239

    Abstract In the emerging field of image segmentation, Fully Convolutional Networks (FCNs) have recently become prominent. However, their effectiveness is intimately linked with the correct selection and fine-tuning of hyperparameters, which can often be a cumbersome manual task. The main aim of this study is to propose a more efficient, less labour-intensive approach to hyperparameter optimization in FCNs for segmenting fundus images. To this end, our research introduces a hyperparameter-optimized Fully Convolutional Encoder-Decoder Network (FCEDN). The optimization is handled by a novel Genetic Grey Wolf Optimization (G-GWO) algorithm. This algorithm employs the Genetic Algorithm (GA) to generate a diverse set of… More >

  • Open Access

    ARTICLE

    Consortium Chain Consensus Vulnerability and Chain Generation Mechanism

    Rui Qiao, Shi Dong*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.043476

    Abstract Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains. Therefore, this paper proposes a new consortium chain generation model, deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes, and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security. Furthermore, the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived. When either of the… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042403

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission, intertwined with resource allocation tactics.… More >

  • Open Access

    ARTICLE

    Adaptive Deep Learning Model to Enhance Smart Greenhouse Agriculture

    Medhat A. Tawfeek1,2, Nacim Yanes3,4, Leila Jamel5,*, Ghadah Aldehim5, Mahmood A. Mahmood1,6

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042179

    Abstract The trend towards smart greenhouses stems from various factors, including a lack of agricultural land area owing to population concentration and housing construction on agricultural land, as well as water shortages. This study proposes building a full farming adaptation model that depends on current sensor readings and available datasets from different agricultural research centers. The proposed model uses a one-dimensional convolutional neural network (CNN) deep learning model to control the growth of strategic crops, including cucumber, pepper, tomato, and bean. The proposed model uses the Internet of Things (IoT) to collect data on agricultural operations and then uses this data… More >

  • Open Access

    ARTICLE

    VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity

    Junqiang Jiang1,2, Zhifang Sun1, Xiong Jiang1, Shengjie Jin1, Yinli Jiang3, Bo Fan1,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.041973

    Abstract The grey wolf optimizer (GWO) is a swarm-based intelligence optimization algorithm by simulating the steps of searching, encircling, and attacking prey in the process of wolf hunting. Along with its advantages of simple principle and few parameters setting, GWO bears drawbacks such as low solution accuracy and slow convergence speed. A few recent advanced GWOs are proposed to try to overcome these disadvantages. However, they are either difficult to apply to large-scale problems due to high time complexity or easily lead to early convergence. To solve the abovementioned issues, a high-accuracy variable grey wolf optimizer (VGWO) with low time complexity… More >

  • Open Access

    ARTICLE

    Detecting Android Botnet Applications Using Convolution Neural Network

    Mamona Arshad1, Ahmad Karim1, Salman Naseer2, Shafiq Ahmad3, Mejdal Alqahtani3, Akber Abid Gardezi4, Muhammad Shafiq5,*, Jin-Ghoo Choi5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2022.028680

    Abstract The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e., games applications, entertainment, online banking, social network sites, etc., and also allow the end users to perform a variety of activities. Because of activities, mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information, phishing, spamming, Distributed Denial of Services (DDoS), and malware dissemination. Botnet applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area. A… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Machine Learning Design of Aluminum-Lithium Alloys with High Strength

    Hongxia Wang1,2, Zhiqiang Duan2, Qingwei Guo2, Yongmei Zhang1,2,*, Yuhong Zhao2,3,4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045871

    Abstract Due to the large unexplored compositional space, long development cycle, and high cost of traditional trial-anderror experiments, designing high strength aluminum-lithium alloys is a great challenge. This work establishes a performance-oriented machine learning design strategy for aluminum-lithium alloys to simplify and shorten the development cycle. The calculation results indicate that radial basis function (RBF) neural networks exhibit better predictive ability than back propagation (BP) neural networks. The RBF neural network predicted tensile and yield strengths with determination coefficients of 0.90 and 0.96, root mean square errors of 30.68 and 25.30, and mean absolute errors of 28.15 and 19.08, respectively. In… More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042630

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training parameters associated with the LSTM… More >

Displaying 311-320 on page 32 of 366. Per Page