Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,359)
  • Open Access

    ARTICLE

    Developing Lexicons for Enhanced Sentiment Analysis in Software Engineering: An Innovative Multilingual Approach for Social Media Reviews

    Zohaib Ahmad Khan1, Yuanqing Xia1,*, Ahmed Khan2, Muhammad Sadiq2, Mahmood Alam3, Fuad A. Awwad4, Emad A. A. Ismail4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2771-2793, 2024, DOI:10.32604/cmc.2024.046897

    Abstract Sentiment analysis is becoming increasingly important in today’s digital age, with social media being a significant source of user-generated content. The development of sentiment lexicons that can support languages other than English is a challenging task, especially for analyzing sentiment analysis in social media reviews. Most existing sentiment analysis systems focus on English, leaving a significant research gap in other languages due to limited resources and tools. This research aims to address this gap by building a sentiment lexicon for local languages, which is then used with a machine learning algorithm for efficient sentiment analysis. In the first step, a… More >

  • Open Access

    ARTICLE

    Research on Performance Optimization of Spark Distributed Computing Platform

    Qinlu He1,*, Fan Zhang1, Genqing Bian1, Weiqi Zhang1, Zhen Li2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2833-2850, 2024, DOI:10.32604/cmc.2024.046807

    Abstract Spark, a distributed computing platform, has rapidly developed in the field of big data. Its in-memory computing feature reduces disk read overhead and shortens data processing time, making it have broad application prospects in large-scale computing applications such as machine learning and image processing. However, the performance of the Spark platform still needs to be improved. When a large number of tasks are processed simultaneously, Spark’s cache replacement mechanism cannot identify high-value data partitions, resulting in memory resources not being fully utilized and affecting the performance of the Spark platform. To address the problem that Spark’s default cache replacement algorithm… More >

  • Open Access

    ARTICLE

    Enhanced Object Detection and Classification via Multi-Method Fusion

    Muhammad Waqas Ahmed1, Nouf Abdullah Almujally2, Abdulwahab Alazeb3, Asaad Algarni4, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3315-3331, 2024, DOI:10.32604/cmc.2024.046501

    Abstract Advances in machine vision systems have revolutionized applications such as autonomous driving, robotic navigation, and augmented reality. Despite substantial progress, challenges persist, including dynamic backgrounds, occlusion, and limited labeled data. To address these challenges, we introduce a comprehensive methodology to enhance image classification and object detection accuracy. The proposed approach involves the integration of multiple methods in a complementary way. The process commences with the application of Gaussian filters to mitigate the impact of noise interference. These images are then processed for segmentation using Fuzzy C-Means segmentation in parallel with saliency mapping techniques to find the most prominent regions. The… More >

  • Open Access

    ARTICLE

    Automatic Finding of Brain-Tumour Group Using CNN Segmentation and Moth-Flame-Algorithm, Selected Deep and Handcrafted Features

    Imad Saud Al Naimi1,2,*, Syed Alwee Aljunid Syed Junid1, Muhammad lmran Ahmad1,*, K. Suresh Manic2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2585-2608, 2024, DOI:10.32604/cmc.2024.046461

    Abstract Augmentation of abnormal cells in the brain causes brain tumor (BT), and early screening and treatment will reduce its harshness in patients. BT’s clinical level screening is usually performed with Magnetic Resonance Imaging (MRI) due to its multi-modality nature. The overall aims of the study is to introduce, test and verify an advanced image processing technique with algorithms to automatically extract tumour sections from brain MRI scans, facilitating improved accuracy. The research intends to devise a reliable framework for detecting the BT region in the two-dimensional (2D) MRI slice, and identifying its class with improved accuracy. The methodology for the… More >

  • Open Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314

    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts of each point, we develop… More >

  • Open Access

    ARTICLE

    Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

    Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3397-3416, 2024, DOI:10.32604/cmc.2024.046265

    Abstract A new era of data access and management has begun with the use of cloud computing in the healthcare industry. Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a major concern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentiality and integrity of healthcare data in the cloud. The computational overhead of encryption technologies could lead to delays in data access and processing rates. To address these challenges, we introduced the Enhanced Parallel Multi-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate… More >

  • Open Access

    REVIEW

    Survey of Indoor Localization Based on Deep Learning

    Khaldon Azzam Kordi1, Mardeni Roslee1,*, Mohamad Yusoff Alias1, Abdulraqeb Alhammadi2, Athar Waseem3, Anwar Faizd Osman4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3261-3298, 2024, DOI:10.32604/cmc.2024.044890

    Abstract This study comprehensively examines the current state of deep learning (DL) usage in indoor positioning. It emphasizes the significance and efficiency of convolutional neural networks (CNNs) and recurrent neural networks (RNNs). Unlike prior studies focused on single sensor modalities like Wi-Fi or Bluetooth, this research explores the integration of multiple sensor modalities (e.g., Wi-Fi, Bluetooth, Ultra-Wideband, ZigBee) to expand indoor localization methods, particularly in obstructed environments. It addresses the challenge of precise object localization, introducing a novel hybrid DL approach using received signal information (RSI), Received Signal Strength (RSS), and Channel State Information (CSI) data to enhance accuracy and stability.… More >

  • Open Access

    ARTICLE

    Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach

    Wajdi Alhakami*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3211-3237, 2024, DOI:10.32604/cmc.2023.043935

    Abstract The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatory mechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of… More >

  • Open Access

    ARTICLE

    Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution

    Israa Ismail1,*, Ghada Eltaweel1, Mohamed Meselhy Eltoukhy1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3193-3209, 2024, DOI:10.32604/cmc.2023.043873

    Abstract Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution inputs. Super-resolution is of paramount importance in the context of remote sensing, satellite, aerial, security and surveillance imaging. Super-resolution remote sensing imagery is essential for surveillance and security purposes, enabling authorities to monitor remote or sensitive areas with greater clarity. This study introduces a single-image super-resolution approach for remote sensing images, utilizing deep shearlet residual learning in the shearlet transform domain, and incorporating the Enhanced Deep Super-Resolution network (EDSR). Unlike conventional approaches that estimate residuals between high and low-resolution images, the proposed approach… More >

  • Open Access

    ARTICLE

    RoGRUT: A Hybrid Deep Learning Model for Detecting Power Trapping in Smart Grids

    Farah Mohammad1,*, Saad Al-Ahmadi2, Jalal Al-Muhtadi1,2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3175-3192, 2024, DOI:10.32604/cmc.2023.042873

    Abstract Electricity theft is a widespread non-technical issue that has a negative impact on both power grids and electricity users. It hinders the economic growth of utility companies, poses electrical risks, and impacts the high energy costs borne by consumers. The development of smart grids is crucial for the identification of power theft since these systems create enormous amounts of data, including information on client consumption, which may be used to identify electricity theft using machine learning and deep learning techniques. Moreover, there also exist different solutions such as hardware-based solutions to detect electricity theft that may require human resources and… More >

Displaying 101-110 on page 11 of 22359. Per Page