Guest Editors
Dr. Dharmendra Singh Rajput, Vellore Institute of Technology, India.
Dr. Syed Muzamil Basha, Sri Krishna College of Engineering and Technology Coimbatore, India.
Dr. Dr. Thippa Reddy G, Vellore Institute of Technology, India.
Dr. Saurabh Singh, Dingguk University, South Korea.
Summary
Today, artificial intelligence (AI) is the mainstream technology for all the companies, unicorns, and industries those are aiming to improvise to increase revenue. AI is the buzz word of the century, but most of them don't understand it well. Before understanding AI, understanding its subsets is important. Machine Learning (ML) and Deep Learning (DL). ML is an algorithmic approach to train & teach the machine to perform predictive tasks and test them to improve based on their performance. DL on the other hand structures algorithms in layers to create neural networks that can make the decisions on their own.
Even though humanity is ready to switch from gasoline to electricity, Data is the fuel for all, even to decide the next leader. There is no demand, it's is been flooded on daily basis. Processing those may bring peace or war, it depends on the purposes.
Data Science and its contribution to the field of AI is enormous. The research encompasses statistics, mathematics, and computer concepts to deal with big data to visualize the insights that may change the decision and may shape the future. The power of AI is intangible. Recognizing its potential and understanding it is important.
Keywords
• Artificial Intelligence
• Machine learning
• Deep Learning
• Data Science
• Industry 4.0
Published Papers
-
Open Access
ARTICLE
Pandemic Analysis and Prediction of COVID-19 Using Gaussian Doubling Times
Saleh Albahli, Farman Hassan, Ali Javed, Aun Irtaza
CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 833-849, 2022, DOI:10.32604/cmc.2022.024267
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract COVID-19 has become a pandemic, with cases all over the world, with widespread disruption in some countries, such as Italy, US, India, South Korea, and Japan. Early and reliable detection of COVID-19 is mandatory to control the spread of infection. Moreover, prediction of COVID-19 spread in near future is also crucial to better plan for the disease control. For this purpose, we proposed a robust framework for the analysis, prediction, and detection of COVID-19. We make reliable estimates on key pandemic parameters and make predictions on the point of inflection and possible washout time for various countries around the world.…
More >
-
Open Access
ARTICLE
Unstructured Oncological Image Cluster Identification Using Improved Unsupervised Clustering Techniques
S. Sreedhar Kumar, Syed Thouheed Ahmed, Qin Xin, S. Sandeep, M. Madheswaran, Syed Muzamil Basha
CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 281-299, 2022, DOI:10.32604/cmc.2022.023693
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract This paper presents, a new approach of Medical Image Pixels Clustering (MIPC), aims to trace the dissimilar patterns over the Magnetic Resonance (MR) image through the process of automatically identify the appropriate number of distinct clusters based on different improved unsupervised clustering schemes for enrichment, pattern predication and deeper investigation. The proposed MIPC consists of two stages: clustering and validation. In the clustering stage, the MIPC automatically identifies the distinct number of dissimilar clusters over the gray scale MR image based on three different improved unsupervised clustering schemes likely improved Limited Agglomerative Clustering (iLIAC), Dynamic Automatic Agglomerative Clustering (DAAC) and…
More >
-
Open Access
ARTICLE
Decision Support System for Diagnosis of Irregular Fovea
Ghulam Ali Mallah, Jamil Ahmed, Muhammad Irshad Nazeer, Mazhar Ali Dootio, Hidayatullah Shaikh, Aadil Jameel
CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5343-5353, 2022, DOI:10.32604/cmc.2022.023581
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Detection of abnormalities in human eye is one of the well-established research areas of Machine Learning. Deep Learning techniques are widely used for the diagnosis of Retinal Diseases (RD). Fovea is one of the significant parts of retina which would be prevented before the involvement of Perforated Blood Vessels (PBV). Retinopathy Images (RI) contains sufficient information to classify structural changes incurred upon PBV but Macular Features (MF) and Fovea Features (FF) are very difficult to detect because features of MF and FF could be found with Similar Color Movements (SCM) with minor variations. This paper presents novel method for the…
More >
-
Open Access
ARTICLE
Fake News Classification Using a Fuzzy Convolutional Recurrent Neural Network
Dheeraj Kumar Dixit, Amit Bhagat, Dharmendra Dangi
CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5733-5750, 2022, DOI:10.32604/cmc.2022.023628
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract In recent years, social media platforms have gained immense popularity. As a result, there has been a tremendous increase in content on social media platforms. This content can be related to an individual's sentiments, thoughts, stories, advertisements, and news, among many other content types. With the recent increase in online content, the importance of identifying fake and real news has increased. Although, there is a lot of work present to detect fake news, a study on Fuzzy CRNN was not explored into this direction. In this work, a system is designed to classify fake and real news using fuzzy logic.…
More >
-
Open Access
ARTICLE
Twisted Pair Cable Fault Diagnosis via Random Forest Machine Learning
N. B. Ghazali, F. C. Seman, K. Isa, K. N. Ramli, Z. Z. Abidin, S. M. Mustam, M. A. Haek, A. N. Z. Abidin, A. Asrokin
CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5427-5440, 2022, DOI:10.32604/cmc.2022.023211
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Applying the fault diagnosis techniques to twisted pair copper cable is beneficial to improve the stability and reliability of internet access in Digital Subscriber Line (DSL) Access Network System. The network performance depends on the occurrence of cable fault along the copper cable. Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. The…
More >
-
Open Access
ARTICLE
Estimating Weibull Parameters Using Least Squares and Multilayer Perceptron vs. Bayes Estimation
Walid Aydi, Fuad S. Alduais
CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4033-4050, 2022, DOI:10.32604/cmc.2022.023119
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The Weibull distribution is regarded as among the finest in the family of failure distributions. One of the most commonly used parameters of the Weibull distribution (WD) is the ordinary least squares (OLS) technique, which is useful in reliability and lifetime modeling. In this study, we propose an approach based on the ordinary least squares and the multilayer perceptron (MLP) neural network called the OLSMLP that is based on the resilience of the OLS method. The MLP solves the problem of heteroscedasticity that distorts the estimation of the parameters of the WD due to the presence of outliers, and eases…
More >
-
Open Access
ARTICLE
Deep Neural Network and Pseudo Relevance Feedback Based Query Expansion
Abhishek Kumar Shukla, Sujoy Das
CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3557-3570, 2022, DOI:10.32604/cmc.2022.022411
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The neural network has attracted researchers immensely in the last couple of years due to its wide applications in various areas such as Data mining, Natural language processing, Image processing, and Information retrieval etc. Word embedding has been applied by many researchers for Information retrieval tasks. In this paper word embedding-based skip-gram model has been developed for the query expansion task. Vocabulary terms are obtained from the top “k” initially retrieved documents using the Pseudo relevance feedback model and then they are trained using the skip-gram model to find the expansion terms for the user query. The performance of the…
More >
-
Open Access
ARTICLE
A Study on Classification and Detection of Small Moths Using CNN Model
Sang-Hyun Lee
CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1987-1998, 2022, DOI:10.32604/cmc.2022.022554
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Currently, there are many limitations to classify images of small objects. In addition, there are limitations such as error detection due to external factors, and there is also a disadvantage that it is difficult to accurately distinguish between various objects. This paper uses a convolutional neural network (CNN) algorithm to recognize and classify object images of very small moths and obtain precise data images. A convolution neural network algorithm is used for image data classification, and the classified image is transformed into image data to learn the topological structure of the image. To improve the accuracy of the image classification…
More >
-
Open Access
ARTICLE
Convolutional Neural Network-Based Identity Recognition Using ECG at Different Water Temperatures During Bathing
Jianbo Xu, Wenxi Chen
CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1807-1819, 2022, DOI:10.32604/cmc.2022.021154
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract This study proposes a convolutional neural network (CNN)-based identity recognition scheme using electrocardiogram (ECG) at different water temperatures (WTs) during bathing, aiming to explore the impact of ECG length on the recognition rate. ECG data was collected using non-contact electrodes at five different WTs during bathing. Ten young student subjects (seven men and three women) participated in data collection. Three ECG recordings were collected at each preset bathtub WT for each subject. Each recording is 18 min long, with a sampling rate of 200 Hz. In total, 150 ECG recordings and 150 WT recordings were collected. The R peaks were…
More >
-
Open Access
ARTICLE
Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique
Abdulaziz Attaallah, Raees Ahmad Khan
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5683-5705, 2022, DOI:10.32604/cmc.2022.021643
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to…
More >
-
Open Access
ARTICLE
Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
Neha Malhotra, Manju Bala
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure.…
More >
-
Open Access
ARTICLE
Sentiment Analysis on Social Media Using Genetic Algorithm with CNN
Dharmendra Dangi, Amit Bhagat, Dheeraj Kumar Dixit
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5399-5419, 2022, DOI:10.32604/cmc.2022.020431
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract There are various intense forces causing customers to use evaluated data when using social media platforms and microblogging sites. Today, customers throughout the world share their points of view on all kinds of topics through these sources. The massive volume of data created by these customers makes it impossible to analyze such data manually. Therefore, an efficient and intelligent method for evaluating social media data and their divergence needs to be developed. Today, various types of equipment and techniques are available for automatically estimating the classification of sentiments. Sentiment analysis involves determining people's emotions using facial expressions. Sentiment analysis can…
More >
-
Open Access
ARTICLE
Training Multi-Layer Perceptron with Enhanced Brain Storm Optimization Metaheuristics
Nebojsa Bacanin, Khaled Alhazmi, Miodrag Zivkovic, K. Venkatachalam, Timea Bezdan, Jamel Nebhen
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4199-4215, 2022, DOI:10.32604/cmc.2022.020449
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract In the domain of artificial neural networks, the learning process represents one of the most challenging tasks. Since the classification accuracy highly depends on the weights and biases, it is crucial to find its optimal or suboptimal values for the problem at hand. However, to a very large search space, it is very difficult to find the proper values of connection weights and biases. Employing traditional optimization algorithms for this issue leads to slow convergence and it is prone to get stuck in the local optima. Most commonly, back-propagation is used for multi-layer-perceptron training and it can lead to vanishing…
More >
-
Open Access
ARTICLE
Dorsal-Ventral Visual Pathways and Object Characteristics: Beamformer Source Analysis of EEG
Akanksha Tiwari, Ram Bilas Pachori, Premjit Khanganba Sanjram
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2347-2363, 2022, DOI:10.32604/cmc.2022.020299
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract In performing a gaming task, mental rotation (MR) is one of the important aspects of visuospatial processing. MR involves dorsal-ventral pathways of the brain. Visual objects/models used in computer-games play a crucial role in gaming experience of the users. The visuospatial characteristics of the objects used in the computer-game influence the engagement of dorsal-ventral visual pathways. The current study investigates how the objects’ visuospatial characteristics (i.e., angular disparity and dimensionality) in an MR-based computer-game influence the cortical activities in dorsal-ventral visual pathways. Both the factors have two levels, angular disparity: convex angle (CA)
vs. reflex angle (RA) and dimensionality: 2D…
More >
-
Open Access
ARTICLE
Generating Synthetic Data to Reduce Prediction Error of Energy Consumption
Debapriya Hazra, Wafa Shafqat, Yung-Cheol Byun
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3151-3167, 2022, DOI:10.32604/cmc.2022.020143
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Renewable and nonrenewable energy sources are widely incorporated for solar and wind energy that produces electricity without increasing carbon dioxide emissions. Energy industries worldwide are trying hard to predict future energy consumption that could eliminate over or under contracting energy resources and unnecessary financing. Machine learning techniques for predicting energy are the trending solution to overcome the challenges faced by energy companies. The basic need for machine learning algorithms to be trained for accurate prediction requires a considerable amount of data. Another critical factor is balancing the data for enhanced prediction. Data Augmentation is a technique used for increasing the…
More >
-
Open Access
ARTICLE
DLBT: Deep Learning-Based Transformer to Generate Pseudo-Code from Source Code
Walaa Gad, Anas Alokla, Waleed Nazih, Mustafa Aref, Abdel-badeeh Salem
CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3117-3132, 2022, DOI:10.32604/cmc.2022.019884
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Understanding the content of the source code and its regular expression is very difficult when they are written in an unfamiliar language. Pseudo-code explains and describes the content of the code without using syntax or programming language technologies. However, writing Pseudo-code to each code instruction is laborious. Recently, neural machine translation is used to generate textual descriptions for the source code. In this paper, a novel deep learning-based transformer (DLBT) model is proposed for automatic Pseudo-code generation from the source code. The proposed model uses deep learning which is based on Neural Machine Translation (NMT) to work as a language…
More >
-
Open Access
ARTICLE
Deep Learning Approach for Analysis and Characterization of COVID-19
Indrajeet Kumar, Sultan S. Alshamrani, Abhishek Kumar, Jyoti Rawat, Kamred Udham Singh, Mamoon Rashid, Ahmed Saeed AlGhamdi
CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 451-468, 2022, DOI:10.32604/cmc.2022.019443
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Early diagnosis of a pandemic disease like COVID-19 can help deal with a dire situation and help radiologists and other experts manage human resources more effectively. In a recent pandemic, laboratories perform diagnostics manually, which requires a lot of time and expertise of the laboratorial technicians to yield accurate results. Moreover, the cost of kits is high, and well-equipped labs are needed to perform this test. Therefore, other means of diagnosis is highly desirable. Radiography is one of the existing methods that finds its use in the diagnosis of COVID-19. The radiography observes change in Computed Tomography (CT) chest images…
More >
-
Open Access
ARTICLE
A Hybrid Approach for Network Intrusion Detection
Mavra Mehmood, Talha Javed, Jamel Nebhen, Sidra Abbas, Rabia Abid, Giridhar Reddy Bojja, Muhammad Rizwan
CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 91-107, 2022, DOI:10.32604/cmc.2022.019127
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization's network infrastructure. Thus, a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic. This paper proposes a new hybrid method for intrusion detection and attack categorization. The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization. In the first step, the dataset is preprocessed through the data transformation technique and min-max method. Secondly, the random forest recursive feature elimination…
More >
-
Open Access
ARTICLE
A New Fuzzy Adaptive Algorithm to Classify Imbalanced Data
Harshita Patel, Dharmendra Singh Rajput, Ovidiu Petru Stan, Liviu Cristian Miclea
CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 73-89, 2022, DOI:10.32604/cmc.2022.017114
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Classification of imbalanced data is a well explored issue in the data mining and machine learning community where one class representation is overwhelmed by other classes. The Imbalanced distribution of data is a natural occurrence in real world datasets, so needed to be dealt with carefully to get important insights. In case of imbalance in data sets, traditional classifiers have to sacrifice their performances, therefore lead to misclassifications. This paper suggests a weighted nearest neighbor approach in a fuzzy manner to deal with this issue. We have adapted the ‘existing algorithm modification solution’ to learn from imbalanced datasets that classify…
More >
-
Open Access
ARTICLE
Empirical Assessment of Bacillus Calmette-Guérin Vaccine to Combat COVID-19
Nikita Jain, Vedika Gupta, Chinmay Chakraborty, Agam Madan, Deepali Virmani, Lorenzo Salas-Morera, Laura Garcia-Hernandez
CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 213-231, 2022, DOI:10.32604/cmc.2022.016424
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract COVID-19 has become one of the critical health issues globally, which surfaced first in latter part of the year 2019. It is the topmost concern for many nations’ governments as the contagious virus started mushrooming over adjacent regions of infected areas. In 1980, a vaccine called Bacillus Calmette-Guérin (BCG) was introduced for preventing tuberculosis and lung cancer. Countries that have made the BCG vaccine mandatory have witnessed a lesser COVID-19 fatality rate than the countries that have not made it compulsory. This paper’s initial research shows that the countries with a long-term compulsory BCG vaccination system are less affected by…
More >
-
Open Access
ARTICLE
Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram
Vinay Arora, Karun Verma, Rohan Singh Leekha, Kyungroul Lee, Chang Choi, Takshi Gupta, Kashish Bhatia
CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4151-4168, 2021, DOI:10.32604/cmc.2021.019178
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The early diagnosis of pre-existing coronary disorders helps to control complications such as pulmonary hypertension, irregular cardiac functioning, and heart failure. Machine-based learning of heart sound is an {efficient} technology which can help minimize the workload of manual auscultation by automatically identifying irregular cardiac sounds. Phonocardiogram (PCG) and electrocardiogram (ECG) waveforms provide the much-needed information for the diagnosis of these diseases. In this work, the researchers have converted the heart sound signal into its corresponding repeating pattern-based spectrogram. PhysioNet 2016 and PASCAL 2011 have been taken as the benchmark datasets to perform experimentation. The existing models, viz. MobileNet, Xception, Visual…
More >
-
Open Access
ARTICLE
Robust and Efficient Reliability Estimation for Exponential Distribution
Muhammad Aslam Mohd Safari, Nurulkamal Masseran, Muhammad Hilmi Abdul Majid
CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2807-2824, 2021, DOI:10.32604/cmc.2021.018815
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract In modeling reliability data, the exponential distribution is commonly used due to its simplicity. For estimating the parameter of the exponential distribution, classical estimators including maximum likelihood estimator represent the most commonly used method and are well known to be efficient. However, the maximum likelihood estimator is highly sensitive in the presence of contamination or outliers. In this study, a robust and efficient estimator of the exponential distribution parameter was proposed based on the probability integral transform statistic. To examine the robustness of this new estimator, asymptotic variance, breakdown point, and gross error sensitivity were derived. This new estimator offers…
More >
-
Open Access
ARTICLE
Towards Machine Learning Based Intrusion Detection in IoT Networks
Nahida Islam, Fahiba Farhin, Ishrat Sultana, M. Shamim Kaiser, Md. Sazzadur Rahman, Mufti Mahmud, A. S. M. Sanwar Hosen, Gi Hwan Cho
CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision…
More >
-
Open Access
ARTICLE
An Approach Using Fuzzy Sets and Boosting Techniques to Predict Liver Disease
Pushpendra Kumar, Ramjeevan Singh Thakur
CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3513-3529, 2021, DOI:10.32604/cmc.2021.016957
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract The aim of this research is to develop a mechanism to help medical practitioners predict and diagnose liver disease. Several systems have been proposed to help medical experts by diminishing error and increasing accuracy in diagnosing and predicting diseases. Among many existing methods, a few have considered the class imbalance issues of liver disorder datasets. As all the samples of liver disorder datasets are not useful, they do not contribute to learning about classifiers. A few samples might be redundant, which can increase the computational cost and affect the performance of the classifier. In this paper, a model has been…
More >
-
Open Access
ARTICLE
Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction
Kathiravan Srinivasan, Lalit Garg, Debajit Datta, Abdulellah A. Alaboudi, N. Z. Jhanjhi, Rishav Agarwal, Anmol George Thomas
CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4109-4124, 2021, DOI:10.32604/cmc.2021.016736
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract According to various worldwide statistics, most car accidents occur solely due to human error. The person driving a car needs to be alert, especially when travelling through high traffic volumes that permit high-speed transit since a slight distraction can cause a fatal accident. Even though semi-automated checks, such as speed detecting cameras and speed barriers, are deployed, controlling human errors is an arduous task. The key causes of driver’s distraction include drunken driving, conversing with co-passengers, fatigue, and operating gadgets while driving. If these distractions are accurately predicted, the drivers can be alerted through an alarm system. Further, this research…
More >
-
Open Access
ARTICLE
Early Tumor Diagnosis in Brain MR Images via Deep Convolutional Neural Network Model
Tapan Kumar Das, Pradeep Kumar Roy, Mohy Uddin, Kathiravan Srinivasan, Chuan-Yu Chang, Shabbir Syed-Abdul
CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2413-2429, 2021, DOI:10.32604/cmc.2021.016698
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Machine learning based image analysis for predicting and diagnosing certain diseases has been entirely trustworthy and even as efficient as a domain expert’s inspection. However, the style of non-transparency functioning by a trained machine learning system poses a more significant impediment for seamless knowledge trajectory, clinical mapping, and delusion tracing. In this proposed study, a deep learning based framework that employs deep convolution neural network (Deep-CNN), by utilizing both clinical presentations and conventional magnetic resonance imaging (MRI) investigations, for diagnosing tumors is explored. This research aims to develop a model that can be used for abnormality detection over MRI data…
More >
-
Open Access
ARTICLE
Multi Sensor-Based Implicit User Identification
Muhammad Ahmad, Rana Aamir Raza, Manuel Mazzara, Salvatore Distefano, Ali Kashif Bashir, Adil Khan, Muhammad Shahzad Sarfraz, Muhammad Umar Aftab
CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1673-1692, 2021, DOI:10.32604/cmc.2021.016232
(This article belongs to this Special Issue:
Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features, then further optimized…
More >