Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Improved Metaheuristics with Machine Learning Enabled Medical Decision Support System

    Sara A. Althubiti1, José Escorcia-Gutierrez2,3,*, Margarita Gamarra4, Roosvel Soto-Diaz5, Romany F. Mansour6, Fayadh Alenezi7

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2423-2439, 2022, DOI:10.32604/cmc.2022.028878

    Abstract Smart healthcare has become a hot research topic due to the contemporary developments of Internet of Things (IoT), sensor technologies, cloud computing, and others. Besides, the latest advances of Artificial Intelligence (AI) tools find helpful for decision-making in innovative healthcare to diagnose several diseases. Ovarian Cancer (OC) is a kind of cancer that affects women’s ovaries, and it is tedious to identify OC at the primary stages with a high mortality rate. The OC data produced by the Internet of Medical Things (IoMT) devices can be utilized to differentiate OC. In this aspect, this paper introduces a new quantum black… More >

  • Open Access

    ARTICLE

    Optimal Deep Transfer Learning Model for Histopathological Breast Cancer Classification

    Mahmoud Ragab1,2,3,*, Alaa F. Nahhas4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2849-2864, 2022, DOI:10.32604/cmc.2022.028855

    Abstract Earlier recognition of breast cancer is crucial to decrease the severity and optimize the survival rate. One of the commonly utilized imaging modalities for breast cancer is histopathological images. Since manual inspection of histopathological images is a challenging task, automated tools using deep learning (DL) and artificial intelligence (AI) approaches need to be designed. The latest advances of DL models help in accomplishing maximum image classification performance in several application areas. In this view, this study develops a Deep Transfer Learning with Rider Optimization Algorithm for Histopathological Classification of Breast Cancer (DTLRO-HCBC) technique. The proposed DTLRO-HCBC technique aims to categorize… More >

  • Open Access

    ARTICLE

    Real-Time Multi-Class Infection Classification for Respiratory Diseases

    Ahmed ElShafee1, Walid El-Shafai2, Abdulaziz Alarifi3,*, Mohammed Amoon3, Aman Singh4, Moustafa H. Aly5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4157-4177, 2022, DOI:10.32604/cmc.2022.028847

    Abstract Real-time disease prediction has emerged as the main focus of study in the field of computerized medicine. Intelligent disease identification framework can assist medical practitioners in diagnosing disease in a way that is reliable, consistent, and timely, successfully lowering mortality rates, particularly during endemics and pandemics. To prevent this pandemic’s rapid and widespread, it is vital to quickly identify, confine, and treat affected individuals. The need for auxiliary computer-aided diagnostic (CAD) systems has grown. Numerous recent studies have indicated that radiological pictures contained critical information regarding the COVID-19 virus. Utilizing advanced convolutional neural network (CNN) architectures in conjunction with radiological… More >

  • Open Access

    ARTICLE

    A Hybrid Particle Swarm Optimization to Forecast Implied Volatility Risk

    Kais Tissaoui1,2,*, Sahbi Boubaker3,4, Waleed Saud Alghassab1, Taha Zaghdoudi1,5, Jamel Azibi6

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4291-4309, 2022, DOI:10.32604/cmc.2022.028830

    Abstract The application of optimization methods to prediction issues is a continually exploring field. In line with this, this paper investigates the connectedness between the infected cases of COVID-19 and US fear index from a forecasting perspective. The complex characteristics of implied volatility risk index such as non-linearity structure, time-varying and non-stationarity motivate us to apply a nonlinear polynomial Hammerstein model with known structure and unknown parameters. We use the Hybrid Particle Swarm Optimization (HPSO) tool to identify the model parameters of nonlinear polynomial Hammerstein model. Findings indicate that, following a nonlinear polynomial behaviour cascaded to an autoregressive with exogenous input… More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois… More >

  • Open Access

    ARTICLE

    A Dynamic Reputation–based Consensus Mechanism for Blockchain

    Xiaofang Qiu1,2, Zhi Qin1,2,*, Wunan Wan1,2, Jinquan Zhang1,2, Jinliang Guo1,2, Shibin Zhang1,2, Jinyue Xia3

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2577-2589, 2022, DOI:10.32604/cmc.2022.028757

    Abstract In recent years, Blockchain is gaining prominence as a hot topic in academic research. However, the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance. Although Proof-of-Authority (PoA) consensus mechanism, as a lightweight consensus mechanism, is more efficient than traditional Proof-of-Work (PoW) and Proof-of-Stake (PoS), it suffers from the problem of centralization. To this end, on account of analyzing the shortcomings of existing consensus mechanisms, this paper proposes a dynamic reputation-based consensus mechanism for blockchain. This scheme allows nodes with reputation value higher than a threshold apply to become a monitoring node, which can monitor… More >

  • Open Access

    ARTICLE

    A Hybrid Security Framework for Medical Image Communication

    Walid El-Shafai1,2, Hayam A. Abd El-Hameed3, Ashraf A. M. Khalaf3, Naglaa F. Soliman4, Amel A. Alhussan5,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2713-2730, 2022, DOI:10.32604/cmc.2022.028739

    Abstract Authentication of the digital image has much attention for the digital revolution. Digital image authentication can be verified with image watermarking and image encryption schemes. These schemes are widely used to protect images against forgery attacks, and they are useful for protecting copyright and rightful ownership. Depending on the desirable applications, several image encryption and watermarking schemes have been proposed to moderate this attention. This framework presents a new scheme that combines a Walsh Hadamard Transform (WHT)-based image watermarking scheme with an image encryption scheme based on Double Random Phase Encoding (DRPE). First, on the sender side, the secret medical… More >

  • Open Access

    ARTICLE

    Hybrid Segmentation Approach for Different Medical Image Modalities

    Walid El-Shafai1,2, Amira A. Mahmoud1, El-Sayed M. El-Rabaie1, Taha E. Taha1, Osama F. Zahran1, Adel S. El-Fishawy1, Naglaa F. Soliman3, Amel A. Alhussan4,*, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3455-3472, 2022, DOI:10.32604/cmc.2022.028722

    Abstract The segmentation process requires separating the image region into sub-regions of similar properties. Each sub-region has a group of pixels having the same characteristics, such as texture or intensity. This paper suggests an efficient hybrid segmentation approach for different medical image modalities based on particle swarm optimization (PSO) and improved fast fuzzy C-means clustering (IFFCM) algorithms. An extensive comparative study on different medical images is presented between the proposed approach and other different previous segmentation techniques. The existing medical image segmentation techniques incorporate clustering, thresholding, graph-based, edge-based, active contour, region-based, and watershed algorithms. This paper extensively analyzes and summarizes the… More >

  • Open Access

    ARTICLE

    A Hybrid Duo-Deep Learning and Best Features Based Framework for Action Recognition

    Muhammad Naeem Akbar1,*, Farhan Riaz1, Ahmed Bilal Awan1, Muhammad Attique Khan2, Usman Tariq3, Saad Rehman2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2555-2576, 2022, DOI:10.32604/cmc.2022.028696

    Abstract Human Action Recognition (HAR) is a current research topic in the field of computer vision that is based on an important application known as video surveillance. Researchers in computer vision have introduced various intelligent methods based on deep learning and machine learning, but they still face many challenges such as similarity in various actions and redundant features. We proposed a framework for accurate human action recognition (HAR) based on deep learning and an improved features optimization algorithm in this paper. From deep learning feature extraction to feature classification, the proposed framework includes several critical steps. Before training fine-tuned deep learning… More >

  • Open Access

    ARTICLE

    An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks

    Farag Azzedin*, Husam Suwad, Md Mahfuzur Rahman

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3003-3020, 2022, DOI:10.32604/cmc.2022.028646

    Abstract This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’ behavior. Current security solutions rely on information coming from attackers. Examples are current monitoring and detection security solutions such as intrusion prevention/detection systems and firewalls. This article envisions creating an imbalance between attackers and defenders in favor of defenders. As such, we are proposing to flip the security game such that it will be led by defenders and not attackers. We are proposing a security system that does not observe the behavior of the attack. On… More >

Displaying 7481-7490 on page 749 of 22212. Per Page