Special Issues
Table of Content

Emerging Applications of Artificial Intelligence, Machine learning and Data Science

Submission Deadline: 25 October 2021 (closed) View: 279

Guest Editors

Dr. Dharmendra Singh Rajput, Vellore Institute of Technology, India.
Dr. Syed Muzamil Basha, Sri Krishna College of Engineering and Technology Coimbatore, India.
Dr. Dr. Thippa Reddy G, Vellore Institute of Technology, India.
Dr. Saurabh Singh, Dingguk University, South Korea.

Summary

Today, artificial intelligence (AI) is the mainstream technology for all the companies, unicorns, and industries those are aiming to improvise to increase revenue. AI is the buzz word of the century, but most of them don't understand it well. Before understanding AI, understanding its subsets is important. Machine Learning (ML) and Deep Learning (DL). ML is an algorithmic approach to train & teach the machine to perform predictive tasks and test them to improve based on their performance. DL on the other hand structures algorithms in layers to create neural networks that can make the decisions on their own.

Even though humanity is ready to switch from gasoline to electricity, Data is the fuel for all, even to decide the next leader. There is no demand, it's is been flooded on daily basis. Processing those may bring peace or war, it depends on the purposes.

Data Science and its contribution to the field of AI is enormous. The research encompasses statistics, mathematics, and computer concepts to deal with big data to visualize the insights that may change the decision and may shape the future. The power of AI is intangible. Recognizing its potential and understanding it is important.


Keywords

• Artificial Intelligence
• Machine learning
• Deep Learning
• Data Science
• Industry 4.0

Published Papers


  • Open Access

    ARTICLE

    Pandemic Analysis and Prediction of COVID-19 Using Gaussian Doubling Times

    Saleh Albahli, Farman Hassan, Ali Javed, Aun Irtaza
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 833-849, 2022, DOI:10.32604/cmc.2022.024267
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract COVID-19 has become a pandemic, with cases all over the world, with widespread disruption in some countries, such as Italy, US, India, South Korea, and Japan. Early and reliable detection of COVID-19 is mandatory to control the spread of infection. Moreover, prediction of COVID-19 spread in near future is also crucial to better plan for the disease control. For this purpose, we proposed a robust framework for the analysis, prediction, and detection of COVID-19. We make reliable estimates on key pandemic parameters and make predictions on the point of inflection and possible washout time for… More >

  • Open Access

    ARTICLE

    Unstructured Oncological Image Cluster Identification Using Improved Unsupervised Clustering Techniques

    S. Sreedhar Kumar, Syed Thouheed Ahmed, Qin Xin, S. Sandeep, M. Madheswaran, Syed Muzamil Basha
    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 281-299, 2022, DOI:10.32604/cmc.2022.023693
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract This paper presents, a new approach of Medical Image Pixels Clustering (MIPC), aims to trace the dissimilar patterns over the Magnetic Resonance (MR) image through the process of automatically identify the appropriate number of distinct clusters based on different improved unsupervised clustering schemes for enrichment, pattern predication and deeper investigation. The proposed MIPC consists of two stages: clustering and validation. In the clustering stage, the MIPC automatically identifies the distinct number of dissimilar clusters over the gray scale MR image based on three different improved unsupervised clustering schemes likely improved Limited Agglomerative Clustering (iLIAC), Dynamic More >

  • Open Access

    ARTICLE

    Decision Support System for Diagnosis of Irregular Fovea

    Ghulam Ali Mallah, Jamil Ahmed, Muhammad Irshad Nazeer, Mazhar Ali Dootio, Hidayatullah Shaikh, Aadil Jameel
    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5343-5353, 2022, DOI:10.32604/cmc.2022.023581
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Detection of abnormalities in human eye is one of the well-established research areas of Machine Learning. Deep Learning techniques are widely used for the diagnosis of Retinal Diseases (RD). Fovea is one of the significant parts of retina which would be prevented before the involvement of Perforated Blood Vessels (PBV). Retinopathy Images (RI) contains sufficient information to classify structural changes incurred upon PBV but Macular Features (MF) and Fovea Features (FF) are very difficult to detect because features of MF and FF could be found with Similar Color Movements (SCM) with minor variations. This paper… More >

  • Open Access

    ARTICLE

    Fake News Classification Using a Fuzzy Convolutional Recurrent Neural Network

    Dheeraj Kumar Dixit, Amit Bhagat, Dharmendra Dangi
    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5733-5750, 2022, DOI:10.32604/cmc.2022.023628
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract In recent years, social media platforms have gained immense popularity. As a result, there has been a tremendous increase in content on social media platforms. This content can be related to an individual's sentiments, thoughts, stories, advertisements, and news, among many other content types. With the recent increase in online content, the importance of identifying fake and real news has increased. Although, there is a lot of work present to detect fake news, a study on Fuzzy CRNN was not explored into this direction. In this work, a system is designed to classify fake and More >

  • Open Access

    ARTICLE

    Twisted Pair Cable Fault Diagnosis via Random Forest Machine Learning

    N. B. Ghazali, F. C. Seman, K. Isa, K. N. Ramli, Z. Z. Abidin, S. M. Mustam, M. A. Haek, A. N. Z. Abidin, A. Asrokin
    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5427-5440, 2022, DOI:10.32604/cmc.2022.023211
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Applying the fault diagnosis techniques to twisted pair copper cable is beneficial to improve the stability and reliability of internet access in Digital Subscriber Line (DSL) Access Network System. The network performance depends on the occurrence of cable fault along the copper cable. Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and… More >

  • Open Access

    ARTICLE

    Estimating Weibull Parameters Using Least Squares and Multilayer Perceptron vs. Bayes Estimation

    Walid Aydi, Fuad S. Alduais
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 4033-4050, 2022, DOI:10.32604/cmc.2022.023119
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The Weibull distribution is regarded as among the finest in the family of failure distributions. One of the most commonly used parameters of the Weibull distribution (WD) is the ordinary least squares (OLS) technique, which is useful in reliability and lifetime modeling. In this study, we propose an approach based on the ordinary least squares and the multilayer perceptron (MLP) neural network called the OLSMLP that is based on the resilience of the OLS method. The MLP solves the problem of heteroscedasticity that distorts the estimation of the parameters of the WD due to the… More >

  • Open Access

    ARTICLE

    Deep Neural Network and Pseudo Relevance Feedback Based Query Expansion

    Abhishek Kumar Shukla, Sujoy Das
    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3557-3570, 2022, DOI:10.32604/cmc.2022.022411
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The neural network has attracted researchers immensely in the last couple of years due to its wide applications in various areas such as Data mining, Natural language processing, Image processing, and Information retrieval etc. Word embedding has been applied by many researchers for Information retrieval tasks. In this paper word embedding-based skip-gram model has been developed for the query expansion task. Vocabulary terms are obtained from the top “k” initially retrieved documents using the Pseudo relevance feedback model and then they are trained using the skip-gram model to find the expansion terms for the user… More >

  • Open Access

    ARTICLE

    A Study on Classification and Detection of Small Moths Using CNN Model

    Sang-Hyun Lee
    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1987-1998, 2022, DOI:10.32604/cmc.2022.022554
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Currently, there are many limitations to classify images of small objects. In addition, there are limitations such as error detection due to external factors, and there is also a disadvantage that it is difficult to accurately distinguish between various objects. This paper uses a convolutional neural network (CNN) algorithm to recognize and classify object images of very small moths and obtain precise data images. A convolution neural network algorithm is used for image data classification, and the classified image is transformed into image data to learn the topological structure of the image. To improve the More >

  • Open Access

    ARTICLE

    Convolutional Neural Network-Based Identity Recognition Using ECG at Different Water Temperatures During Bathing

    Jianbo Xu, Wenxi Chen
    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1807-1819, 2022, DOI:10.32604/cmc.2022.021154
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract This study proposes a convolutional neural network (CNN)-based identity recognition scheme using electrocardiogram (ECG) at different water temperatures (WTs) during bathing, aiming to explore the impact of ECG length on the recognition rate. ECG data was collected using non-contact electrodes at five different WTs during bathing. Ten young student subjects (seven men and three women) participated in data collection. Three ECG recordings were collected at each preset bathtub WT for each subject. Each recording is 18 min long, with a sampling rate of 200 Hz. In total, 150 ECG recordings and 150 WT recordings were… More >

  • Open Access

    ARTICLE

    Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique

    Abdulaziz Attaallah, Raees Ahmad Khan
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5683-5705, 2022, DOI:10.32604/cmc.2022.021643
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable… More >

  • Open Access

    ARTICLE

    Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

    Neha Malhotra, Manju Bala
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while… More >

  • Open Access

    ARTICLE

    Sentiment Analysis on Social Media Using Genetic Algorithm with CNN

    Dharmendra Dangi, Amit Bhagat, Dheeraj Kumar Dixit
    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5399-5419, 2022, DOI:10.32604/cmc.2022.020431
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract There are various intense forces causing customers to use evaluated data when using social media platforms and microblogging sites. Today, customers throughout the world share their points of view on all kinds of topics through these sources. The massive volume of data created by these customers makes it impossible to analyze such data manually. Therefore, an efficient and intelligent method for evaluating social media data and their divergence needs to be developed. Today, various types of equipment and techniques are available for automatically estimating the classification of sentiments. Sentiment analysis involves determining people's emotions using… More >

  • Open Access

    ARTICLE

    Training Multi-Layer Perceptron with Enhanced Brain Storm Optimization Metaheuristics

    Nebojsa Bacanin, Khaled Alhazmi, Miodrag Zivkovic, K. Venkatachalam, Timea Bezdan, Jamel Nebhen
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4199-4215, 2022, DOI:10.32604/cmc.2022.020449
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract In the domain of artificial neural networks, the learning process represents one of the most challenging tasks. Since the classification accuracy highly depends on the weights and biases, it is crucial to find its optimal or suboptimal values for the problem at hand. However, to a very large search space, it is very difficult to find the proper values of connection weights and biases. Employing traditional optimization algorithms for this issue leads to slow convergence and it is prone to get stuck in the local optima. Most commonly, back-propagation is used for multi-layer-perceptron training and… More >

  • Open Access

    ARTICLE

    Dorsal-Ventral Visual Pathways and Object Characteristics: Beamformer Source Analysis of EEG

    Akanksha Tiwari, Ram Bilas Pachori, Premjit Khanganba Sanjram
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2347-2363, 2022, DOI:10.32604/cmc.2022.020299
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract In performing a gaming task, mental rotation (MR) is one of the important aspects of visuospatial processing. MR involves dorsal-ventral pathways of the brain. Visual objects/models used in computer-games play a crucial role in gaming experience of the users. The visuospatial characteristics of the objects used in the computer-game influence the engagement of dorsal-ventral visual pathways. The current study investigates how the objects’ visuospatial characteristics (i.e., angular disparity and dimensionality) in an MR-based computer-game influence the cortical activities in dorsal-ventral visual pathways. Both the factors have two levels, angular disparity: convex angle (CA) vs. reflex angle… More >

  • Open Access

    ARTICLE

    Generating Synthetic Data to Reduce Prediction Error of Energy Consumption

    Debapriya Hazra, Wafa Shafqat, Yung-Cheol Byun
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3151-3167, 2022, DOI:10.32604/cmc.2022.020143
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Renewable and nonrenewable energy sources are widely incorporated for solar and wind energy that produces electricity without increasing carbon dioxide emissions. Energy industries worldwide are trying hard to predict future energy consumption that could eliminate over or under contracting energy resources and unnecessary financing. Machine learning techniques for predicting energy are the trending solution to overcome the challenges faced by energy companies. The basic need for machine learning algorithms to be trained for accurate prediction requires a considerable amount of data. Another critical factor is balancing the data for enhanced prediction. Data Augmentation is a… More >

  • Open Access

    ARTICLE

    DLBT: Deep Learning-Based Transformer to Generate Pseudo-Code from Source Code

    Walaa Gad, Anas Alokla, Waleed Nazih, Mustafa Aref, Abdel-badeeh Salem
    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3117-3132, 2022, DOI:10.32604/cmc.2022.019884
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Understanding the content of the source code and its regular expression is very difficult when they are written in an unfamiliar language. Pseudo-code explains and describes the content of the code without using syntax or programming language technologies. However, writing Pseudo-code to each code instruction is laborious. Recently, neural machine translation is used to generate textual descriptions for the source code. In this paper, a novel deep learning-based transformer (DLBT) model is proposed for automatic Pseudo-code generation from the source code. The proposed model uses deep learning which is based on Neural Machine Translation (NMT)… More >

  • Open Access

    ARTICLE

    Deep Learning Approach for Analysis and Characterization of COVID-19

    Indrajeet Kumar, Sultan S. Alshamrani, Abhishek Kumar, Jyoti Rawat, Kamred Udham Singh, Mamoon Rashid, Ahmed Saeed AlGhamdi
    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 451-468, 2022, DOI:10.32604/cmc.2022.019443
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Early diagnosis of a pandemic disease like COVID-19 can help deal with a dire situation and help radiologists and other experts manage human resources more effectively. In a recent pandemic, laboratories perform diagnostics manually, which requires a lot of time and expertise of the laboratorial technicians to yield accurate results. Moreover, the cost of kits is high, and well-equipped labs are needed to perform this test. Therefore, other means of diagnosis is highly desirable. Radiography is one of the existing methods that finds its use in the diagnosis of COVID-19. The radiography observes change in… More >

  • Open Access

    ARTICLE

    A Hybrid Approach for Network Intrusion Detection

    Mavra Mehmood, Talha Javed, Jamel Nebhen, Sidra Abbas, Rabia Abid, Giridhar Reddy Bojja, Muhammad Rizwan
    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 91-107, 2022, DOI:10.32604/cmc.2022.019127
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization's network infrastructure. Thus, a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic. This paper proposes a new hybrid method for intrusion detection and attack categorization. The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization. In the first step, the dataset is preprocessed through the data transformation technique and min-max method. Secondly, the More >

  • Open Access

    ARTICLE

    A New Fuzzy Adaptive Algorithm to Classify Imbalanced Data

    Harshita Patel, Dharmendra Singh Rajput, Ovidiu Petru Stan, Liviu Cristian Miclea
    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 73-89, 2022, DOI:10.32604/cmc.2022.017114
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Classification of imbalanced data is a well explored issue in the data mining and machine learning community where one class representation is overwhelmed by other classes. The Imbalanced distribution of data is a natural occurrence in real world datasets, so needed to be dealt with carefully to get important insights. In case of imbalance in data sets, traditional classifiers have to sacrifice their performances, therefore lead to misclassifications. This paper suggests a weighted nearest neighbor approach in a fuzzy manner to deal with this issue. We have adapted the ‘existing algorithm modification solution’ to learn… More >

  • Open Access

    ARTICLE

    Empirical Assessment of Bacillus Calmette-Guérin Vaccine to Combat COVID-19

    Nikita Jain, Vedika Gupta, Chinmay Chakraborty, Agam Madan, Deepali Virmani, Lorenzo Salas-Morera, Laura Garcia-Hernandez
    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 213-231, 2022, DOI:10.32604/cmc.2022.016424
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract COVID-19 has become one of the critical health issues globally, which surfaced first in latter part of the year 2019. It is the topmost concern for many nations’ governments as the contagious virus started mushrooming over adjacent regions of infected areas. In 1980, a vaccine called Bacillus Calmette-Guérin (BCG) was introduced for preventing tuberculosis and lung cancer. Countries that have made the BCG vaccine mandatory have witnessed a lesser COVID-19 fatality rate than the countries that have not made it compulsory. This paper’s initial research shows that the countries with a long-term compulsory BCG vaccination… More >

  • Open Access

    ARTICLE

    Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram

    Vinay Arora, Karun Verma, Rohan Singh Leekha, Kyungroul Lee, Chang Choi, Takshi Gupta, Kashish Bhatia
    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4151-4168, 2021, DOI:10.32604/cmc.2021.019178
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The early diagnosis of pre-existing coronary disorders helps to control complications such as pulmonary hypertension, irregular cardiac functioning, and heart failure. Machine-based learning of heart sound is an {efficient} technology which can help minimize the workload of manual auscultation by automatically identifying irregular cardiac sounds. Phonocardiogram (PCG) and electrocardiogram (ECG) waveforms provide the much-needed information for the diagnosis of these diseases. In this work, the researchers have converted the heart sound signal into its corresponding repeating pattern-based spectrogram. PhysioNet 2016 and PASCAL 2011 have been taken as the benchmark datasets to perform experimentation. The existing More >

  • Open Access

    ARTICLE

    Robust and Efficient Reliability Estimation for Exponential Distribution

    Muhammad Aslam Mohd Safari, Nurulkamal Masseran, Muhammad Hilmi Abdul Majid
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2807-2824, 2021, DOI:10.32604/cmc.2021.018815
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract In modeling reliability data, the exponential distribution is commonly used due to its simplicity. For estimating the parameter of the exponential distribution, classical estimators including maximum likelihood estimator represent the most commonly used method and are well known to be efficient. However, the maximum likelihood estimator is highly sensitive in the presence of contamination or outliers. In this study, a robust and efficient estimator of the exponential distribution parameter was proposed based on the probability integral transform statistic. To examine the robustness of this new estimator, asymptotic variance, breakdown point, and gross error sensitivity were More >

  • Open Access

    ARTICLE

    Towards Machine Learning Based Intrusion Detection in IoT Networks

    Nahida Islam, Fahiba Farhin, Ishrat Sultana, M. Shamim Kaiser, Md. Sazzadur Rahman, Mufti Mahmud, A. S. M. Sanwar Hosen, Gi Hwan Cho
    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 1801-1821, 2021, DOI:10.32604/cmc.2021.018466
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats… More >

  • Open Access

    ARTICLE

    An Approach Using Fuzzy Sets and Boosting Techniques to Predict Liver Disease

    Pushpendra Kumar, Ramjeevan Singh Thakur
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3513-3529, 2021, DOI:10.32604/cmc.2021.016957
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract The aim of this research is to develop a mechanism to help medical practitioners predict and diagnose liver disease. Several systems have been proposed to help medical experts by diminishing error and increasing accuracy in diagnosing and predicting diseases. Among many existing methods, a few have considered the class imbalance issues of liver disorder datasets. As all the samples of liver disorder datasets are not useful, they do not contribute to learning about classifiers. A few samples might be redundant, which can increase the computational cost and affect the performance of the classifier. In this… More >

  • Open Access

    ARTICLE

    Performance Comparison of Deep CNN Models for Detecting Driver’s Distraction

    Kathiravan Srinivasan, Lalit Garg, Debajit Datta, Abdulellah A. Alaboudi, N. Z. Jhanjhi, Rishav Agarwal, Anmol George Thomas
    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4109-4124, 2021, DOI:10.32604/cmc.2021.016736
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract According to various worldwide statistics, most car accidents occur solely due to human error. The person driving a car needs to be alert, especially when travelling through high traffic volumes that permit high-speed transit since a slight distraction can cause a fatal accident. Even though semi-automated checks, such as speed detecting cameras and speed barriers, are deployed, controlling human errors is an arduous task. The key causes of driver’s distraction include drunken driving, conversing with co-passengers, fatigue, and operating gadgets while driving. If these distractions are accurately predicted, the drivers can be alerted through an More >

  • Open Access

    ARTICLE

    Early Tumor Diagnosis in Brain MR Images via Deep Convolutional Neural Network Model

    Tapan Kumar Das, Pradeep Kumar Roy, Mohy Uddin, Kathiravan Srinivasan, Chuan-Yu Chang, Shabbir Syed-Abdul
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2413-2429, 2021, DOI:10.32604/cmc.2021.016698
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Machine learning based image analysis for predicting and diagnosing certain diseases has been entirely trustworthy and even as efficient as a domain expert’s inspection. However, the style of non-transparency functioning by a trained machine learning system poses a more significant impediment for seamless knowledge trajectory, clinical mapping, and delusion tracing. In this proposed study, a deep learning based framework that employs deep convolution neural network (Deep-CNN), by utilizing both clinical presentations and conventional magnetic resonance imaging (MRI) investigations, for diagnosing tumors is explored. This research aims to develop a model that can be used for… More >

  • Open Access

    ARTICLE

    Multi Sensor-Based Implicit User Identification

    Muhammad Ahmad, Rana Aamir Raza, Manuel Mazzara, Salvatore Distefano, Ali Kashif Bashir, Adil Khan, Muhammad Shahzad Sarfraz, Muhammad Umar Aftab
    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1673-1692, 2021, DOI:10.32604/cmc.2021.016232
    (This article belongs to the Special Issue: Emerging Applications of Artificial Intelligence, Machine learning and Data Science)
    Abstract Smartphones have ubiquitously integrated into our home and work environments, however, users normally rely on explicit but inefficient identification processes in a controlled environment. Therefore, when a device is stolen, a thief can have access to the owner’s personal information and services against the stored passwords. As a result of this potential scenario, this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors. A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency… More >

Share Link