Home / Journals / CMC / Vol.67, No.1, 2021
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Smart Object Detection and Home Appliances Control System in Smart Cities

    Sulaiman Khan1, Shah Nazir1, Habib Ullah Khan2,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 895-915, 2021, DOI:10.32604/cmc.2021.013878
    (This article belongs to the Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract During the last decade the emergence of Internet of Things (IoT) based applications inspired the world by providing state of the art solutions to many common problems. From traffic management systems to urban cities planning and development, IoT based home monitoring systems, and many other smart applications. Regardless of these facilities, most of these IoT based solutions are data driven and results in small accuracy values for smaller datasets. In order to address this problem, this paper presents deep learning based hybrid approach for the development of an IoT-based intelligent home security and appliance control system in the smart cities.… More >

  • Open AccessOpen Access

    ARTICLE

    Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform

    Mohammed Alshehri*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 917-931, 2021, DOI:10.32604/cmc.2021.014848
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly, and that can be solved… More >

  • Open AccessOpen Access

    ARTICLE

    AI-Enabled COVID-19 Outbreak Analysis and Prediction: Indian States vs. Union Territories

    Meenu Gupta1, Rachna Jain2, Simrann Arora2, Akash Gupta2, Mazhar Javed Awan3, Gopal Chaudhary2,*, Haitham Nobanee4,5,6
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 933-950, 2021, DOI:10.32604/cmc.2021.014221
    (This article belongs to the Special Issue: AI, IoT, Blockchain Assisted Intelligent Solutions to Medical and Healthcare Systems)
    Abstract The COVID-19 disease has already spread to more than 213 countries and territories with infected (confirmed) cases of more than 27 million people throughout the world so far, while the numbers keep increasing. In India, this deadly disease was first detected on January 30, 2020, in a student of Kerala who returned from Wuhan. Because of India’s high population density, different cultures, and diversity, it is a good idea to have a separate analysis of each state. Hence, this paper focuses on the comprehensive analysis of the effect of COVID-19 on Indian states and Union Territories and the development of… More >

  • Open AccessOpen Access

    ARTICLE

    An Online Chronic Disease Prediction System Based on Incremental Deep Neural Network

    Bin Yang1,*, Lingyun Xiang2, Xianyi Chen3, Wenjing Jia4
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 951-964, 2021, DOI:10.32604/cmc.2021.014839
    Abstract Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network. However, due to the complexity of the human body, there are still many challenges to face in that process. One of them is how to make the neural network prediction model continuously adapt and learn disease data of different patients, online. This paper presents a novel chronic disease prediction system based on an incremental deep neural network. The propensity of users suffering from chronic diseases can continuously be evaluated in an incremental manner. With time, the system can predict diabetes more and more… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling COVID-19 Pandemic Dynamics in Two Asian Countries

    Jin Zhao1, Zubair Ahmad2,*, Zahra Almaspoor2, M. El-Morshedy3,4, Ahmed Z. Afify5
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 965-977, 2021, DOI:10.32604/cmc.2021.014553
    (This article belongs to the Special Issue: Mathematical aspects of the Coronavirus Disease 2019 (COVID-19): Analysis and Control)
    Abstract The current epidemic outbreak COVID-19 first took place in the Wuhan city of China and then spread worldwide. This deadly disease affected millions of people and compelled the governments and other concerned institutions to take serious actions. Around 0.28 million people have died from the COVID-19 outbreak as of May 11, 2020, 05:41 GMT, and the number is still increasing exponentially. The results of any scientific investigation of this phenomenon are still to come. However, now it is urgently needed to evaluate and compare the disease dynamics to improve the quarantine activities and the level of individual protection, to at… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing Network Intrusion Detection Model Using Machine Learning Algorithms

    Nancy Awadallah Awad*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 979-990, 2021, DOI:10.32604/cmc.2021.014307
    Abstract After the digital revolution, large quantities of data have been generated with time through various networks. The networks have made the process of data analysis very difficult by detecting attacks using suitable techniques. While Intrusion Detection Systems (IDSs) secure resources against threats, they still face challenges in improving detection accuracy, reducing false alarm rates, and detecting the unknown ones. This paper presents a framework to integrate data mining classification algorithms and association rules to implement network intrusion detection. Several experiments have been performed and evaluated to assess various machine learning classifiers based on the KDD99 intrusion dataset. Our study focuses… More >

  • Open AccessOpen Access

    ARTICLE

    Power Inverted Topp–Leone Distribution in Acceptance Sampling Plans

    Tahani A. Abushal1, Amal S. Hassan2, Ahmed R. El-Saeed3, Said G. Nassr4,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 991-1011, 2021, DOI:10.32604/cmc.2021.014620
    Abstract We introduce a new two-parameter model related to the inverted Topp–Leone distribution called the power inverted Topp–Leone (PITL) distribution. Major properties of the PITL distribution are stated; including; quantile measures, moments, moment generating function, probability weighted moments, Bonferroni and Lorenz curve, stochastic ordering, incomplete moments, residual life function, and entropy measure. Acceptance sampling plans are developed for the PITL distribution, when the life test is truncated at a pre-specified time. The truncation time is assumed to be the median lifetime of the PITL distribution with pre-specified factors. The minimum sample size necessary to ensure the specified life test is obtained… More >

  • Open AccessOpen Access

    ARTICLE

    Methodology for Detecting Strabismus through Video Analysis and Intelligent Mining Techniques

    Hanan Abdullah Mengash1,*, Hanan A. Hosni Mahmoud1,2
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1013-1032, 2021, DOI:10.32604/cmc.2021.014942
    (This article belongs to the Special Issue: Powering the Future Intelligence - Ambient Social Media Analytics)
    Abstract Strabismus is a medical condition that is defined as the lack of coordination between the eyes. When Strabismus is detected at an early age, the chances of curing it are higher. The methods used to detect strabismus and measure its degree of deviation are complex and time-consuming, and they always require the presence of a physician. In this paper, we present a method of detecting strabismus and measuring its degree of deviation using videos of the patient’s eye region under a cover test. Our method involves extracting features from a set of training videos (training corpora) and using them to… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Breast Cancer Prediction Empowered with Fusion and Deep Learning

    Shahan Yamin Siddiqui1,2, Iftikhar Naseer3, Muhammad Adnan Khan4, Muhammad Faheem Mushtaq5, Rizwan Ali Naqvi6,*, Dildar Hussain7, Amir Haider8
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1033-1049, 2021, DOI:10.32604/cmc.2021.013952
    Abstract Breast cancer is the most frequently detected tumor that eventually could result in a significant increase in female mortality globally. According to clinical statistics, one woman out of eight is under the threat of breast cancer. Lifestyle and inheritance patterns may be a reason behind its spread among women. However, some preventive measures, such as tests and periodic clinical checks can mitigate its risk thereby, improving its survival chances substantially. Early diagnosis and initial stage treatment can help increase the survival rate. For that purpose, pathologists can gather support from nondestructive and efficient computer-aided diagnosis (CAD) systems. This study explores… More >

  • Open AccessOpen Access

    ARTICLE

    An Ontology Based Test Case Prioritization Approach in Regression Testing

    Muhammad Hasnain1, Seung Ryul Jeong2,*, Muhammad Fermi Pasha1, Imran Ghani3
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1051-1068, 2021, DOI:10.32604/cmc.2021.014686
    Abstract Regression testing is a widely studied research area, with the aim of meeting the quality challenges of software systems. To achieve a software system of good quality, we face high consumption of resources during testing. To overcome this challenge, test case prioritization (TCP) as a sub-type of regression testing is continuously investigated to achieve the testing objectives. This study provides an insight into proposing the ontology-based TCP (OTCP) approach, aimed at reducing the consumption of resources for the quality improvement and maintenance of software systems. The proposed approach uses software metrics to examine the behavior of classes of software systems.… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Magnetic Resistive Flow of Generalized Brinkman Type Nanofluid Containing Carbon Nanotubes with Ramped Heating

    Muhammad Saqib1, Ilyas Khan2,*, Sharidan Shafie1, Ahmad Qushairi Mohamad1, El-Sayed M. Sherif3,4
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1069-1084, 2021, DOI:10.32604/cmc.2021.012000
    Abstract In recent times, scientists and engineers have been most attracted to electrically conducted nanofluids due to their numerous applications in various fields of science and engineering. For example, they are used in cancer treatment (hyperthermia), magnetic resonance imaging (MRI), drug-delivery, and magnetic refrigeration (MR). Bearing in mind the significance and importance of electrically conducted nanofluids, this article aims to study an electrically conducted water-based nanofluid containing carbon nanotubes (CNTs). CNTs are of two types, single-wall carbon nanotubes (SWCNTs) and multiple-wall carbon nanotubes (MWCNTs). The CNTs (SWCNTs and MWCNTs) have been dispersed in regular water as base fluid to form water-CNTs… More >

  • Open AccessOpen Access

    ARTICLE

    Automatic Text Summarization Using Genetic Algorithm and Repetitive Patterns

    Ebrahim Heidary1, Hamïd Parvïn2,3,4,*, Samad Nejatian5,6, Karamollah Bagherifard1,6, Vahideh Rezaie6,7, Zulkefli Mansor8, Kim-Hung Pho9
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1085-1101, 2021, DOI:10.32604/cmc.2021.013836
    Abstract Taking into account the increasing volume of text documents, automatic summarization is one of the important tools for quick and optimal utilization of such sources. Automatic summarization is a text compression process for producing a shorter document in order to quickly access the important goals and main features of the input document. In this study, a novel method is introduced for selective text summarization using the genetic algorithm and generation of repetitive patterns. One of the important features of the proposed summarization is to identify and extract the relationship between the main features of the input text and the creation… More >

  • Open AccessOpen Access

    ARTICLE

    Authenblue: A New Authentication Protocol for the Industrial Internet of Things

    Rachid Zagrouba1,*, Asayel AlAbdullatif1, Kholood AlAjaji1, Norah Al-Serhani1, Fahd Alhaidari1, Abdullah Almuhaideb2, Atta-ur-Rahman2
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1103-1119, 2021, DOI:10.32604/cmc.2021.014035
    (This article belongs to the Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract The Internet of Things (IoT) is where almost anything can be controlled and managed remotely by means of sensors. Although the IoT evolution led to quality of life enhancement, many of its devices are insecure. The lack of robust key management systems, efficient identity authentication, low fault tolerance, and many other issues lead to IoT devices being easily targeted by attackers. In this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network (CPANs) in an Industrial IoT (IIoT) environment. This study proposed Authenblue protocol as a… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Broadband Antenna Design for 5G Applications

    Omar A. Saraereh*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1121-1136, 2021, DOI:10.32604/cmc.2021.015066
    Abstract Wireless communication is one of the rapidly-growing fields of the communication industry. This continuous growth motivates the antenna community to design new radiating structures to meet the needs of the market. The 5G wireless communication has received a lot of attention from both academia and industry and significant efforts have been made to improve different aspects, such as data rate, latency, mobility, reliability and QoS. Antenna design has received renewed attention in the last decade due to its potential applications in 5G, IoT, mmWave, and massive MIMO. This paper proposes a novel design of broadband antenna for 5G mmWave and… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Expanding Ring Search Based Per Hop Behavior Rendition of Routing in MANETs

    Durr-e-Nayab1,*, Mohammad Haseeb Zafar1,2, Mohammed Basheri2
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1137-1152, 2021, DOI:10.32604/cmc.2021.014687
    Abstract Routing protocols in Mobile Ad Hoc Networks (MANETs) operate with Expanding Ring Search (ERS) mechanism to avoid flooding in the network while tracing step. ERS mechanism searches the network with discerning Time to Live (TTL) values described by respective routing protocol that save both energy and time. This work exploits the relation between the TTL value of a packet, traffic on a node and ERS mechanism for routing in MANETs and achieves an Adaptive ERS based Per Hop Behavior (AERSPHB) rendition of requests handling. Each search request is classified based on ERS attributes and then processed for routing while monitoring… More >

  • Open AccessOpen Access

    ARTICLE

    COVID-19 and Unemployment: A Novel Bi-Level Optimal Control Model

    Ibrahim M. Hezam1,2,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1153-1167, 2021, DOI:10.32604/cmc.2021.014710
    (This article belongs to the Special Issue: COVID-19 impacts on Software Engineering industry and research community)
    Abstract Since COVID-19 was declared as a pandemic in March 2020, the world’s major preoccupation has been to curb it while preserving the economy and reducing unemployment. This paper uses a novel Bi-Level Dynamic Optimal Control model (BLDOC) to coordinate control between COVID-19 and unemployment. The COVID-19 model is the upper level while the unemployment model is the lower level of the bi-level dynamic optimal control model. The BLDOC model’s main objectives are to minimize the number of individuals infected with COVID-19 and to minimize the unemployed individuals, and at the same time minimizing the cost of the containment strategies. We… More >

  • Open AccessOpen Access

    ARTICLE

    Toward the Optimization of the Region-Based P300 Speller

    A. Benabid Najjar1,*, N. AlSahly2, R. AlShamass1, M. Hosny2
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1169-1189, 2021, DOI:10.32604/cmc.2021.014140
    (This article belongs to the Special Issue: AI, IoT, Blockchain Assisted Intelligent Solutions to Medical and Healthcare Systems)
    Abstract Technology has tremendously contributed to improving communication and facilitating daily activities. Brain-Computer Interface (BCI) study particularly emerged from the need to serve people with disabilities such as Amyotrophic Lateral Sclerosis (ALS). However, with the advancements in cost-effective electronics and computer interface equipment, the BCI study is flourishing, and the exploration of BCI applications for people without disabilities, to enhance normal functioning, is increasing. Particularly, the P300-based spellers are among the most promising applications of the BCI technology. In this context, the region-based paradigm for P300 BCI spellers was introduced in an effort to reduce the crowding effect and adjacency problem… More >

  • Open AccessOpen Access

    ARTICLE

    An LSTM Based Forecasting for Major Stock Sectors Using COVID Sentiment

    Ayesha Jabeen1, Sitara Afzal1, Muazzam Maqsood1, Irfan Mehmood2, Sadaf Yasmin1, Muhammad Tabish Niaz3, Yunyoung Nam4,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1191-1206, 2021, DOI:10.32604/cmc.2021.014598
    (This article belongs to the Special Issue: Artificial Intelligence and Big Data in Entrepreneurship)
    Abstract Stock market forecasting is an important research area, especially for better business decision making. Efficient stock predictions continue to be significant for business intelligence. Traditional short-term stock market forecasting is usually based on historical market data analysis such as stock prices, moving averages, or daily returns. However, major events’ news also contains significant information regarding market drivers. An effective stock market forecasting system helps investors and analysts to use supportive information regarding the future direction of the stock market. This research proposes an efficient model for stock market prediction. The current proposed study explores the positive and negative effects of… More >

  • Open AccessOpen Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293
    (This article belongs to the Special Issue: Management of Security, Privacy and Trust of Multimedia Data in Mobile devices communication)
    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Reordering Trace Files for Improving Software Testing Suitcase

    Yingfu Cai1, Sultan Noman Qasem2,3, Harish Garg4, Hamïd Parvïn5,6,7,*, Kim-Hung Pho8, Zulkefli Mansor9
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1225-1239, 2021, DOI:10.32604/cmc.2021.014699
    (This article belongs to the Special Issue: Emerging Computational Intelligence Technologies for Software Engineering: Paradigms, Principles and Applications)
    Abstract An invariant can be described as an essential relationship between program variables. The invariants are very useful in software checking and verification. The tools that are used to detect invariants are invariant detectors. There are two types of invariant detectors: dynamic invariant detectors and static invariant detectors. Daikon software is an available computer program that implements a special case of a dynamic invariant detection algorithm. Daikon proposes a dynamic invariant detection algorithm based on several runs of the tested program; then, it gathers the values of its variables, and finally, it detects relationships between the variables based on a simple… More >

  • Open AccessOpen Access

    ARTICLE

    Identifying Driver Genes Mutations with Clinical Significance in Thyroid Cancer

    Hyeong Won Yu1, Muhammad Afzal2, Maqbool Hussain2, Hyungju Kwon3, Young Joo Park4, June Young Choi1,*, Kyu Eun Lee5
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1241-1251, 2021, DOI:10.32604/cmc.2021.014910
    (This article belongs to the Special Issue: Machine Learning-based Intelligent Systems: Theories, Algorithms, and Applications)
    Abstract Advances in technology are enabling gene mutations in papillary thyroid carcinoma (PTC) to be analyzed and clinical outcomes, such as recurrence, to be predicted. To date, the most common genetic mutation in PTC is in BRAF kinase (BRAF). However, whether mutations in other genes coincide with those in BRAF remains to be clarified. The aim of this study was to find mutations in other genes that co-exist with mutated BRAF, and to analyze their frequency and clinical relevance in PTC. Clinical and genetic data were collected from 213 PTC patients with a total of 36,572 mutation sites in 735 genes.… More >

  • Open AccessOpen Access

    ARTICLE

    High Order Block Method for Third Order ODEs

    A. I. Asnor1, S. A. M. Yatim1, Z. B. Ibrahim2, N. Zainuddin3
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1253-1267, 2021, DOI:10.32604/cmc.2021.014781
    Abstract Many initial value problems are difficult to be solved using ordinary, explicit step-by-step methods because most of these problems are considered stiff. Certain implicit methods, however, are capable of solving stiff ordinary differential equations (ODEs) usually found in most applied problems. This study aims to develop a new numerical method, namely the high order variable step variable order block backward differentiation formula (VSVO-HOBBDF) for the main purpose of approximating the solutions of third order ODEs. The computational work of the VSVO-HOBBDF method was carried out using the strategy of varying the step size and order in a single code. The… More >

  • Open AccessOpen Access

    ARTICLE

    Intelligent Software-Defined Network for Cognitive Routing Optimization Using Deep Extreme Learning Machine Approach

    Fahd Alhaidari1, Sultan H. Almotiri2, Mohammed A.Al Ghamdi2, Muhammad Adnan Khan3,*, Abdur Rehman4, Sagheer Abbas4, Khalid Masood Khan3, Atta-ur-Rahman5
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1269-1285, 2021, DOI:10.32604/cmc.2021.013303
    Abstract In recent years, the infrastructure, instruments, and resources of network systems are becoming more complex and heterogeneous, with the rapid development of current internet and mobile communication technologies. In order to efficaciously prepare, control, hold and optimize networking systems, greater intelligence needs to be deployed. However, due to the inherently dispensed characteristic of conventional networks, Machine Learning (ML) techniques are hard to implement and deployed to govern and operate networks. Software-Defined Networking (SDN) brings us new possibilities to offer intelligence in the networks. SDN’s characteristics (e.g., logically centralized control, global network view, software-based site visitor analysis, and dynamic updating of… More >

  • Open AccessOpen Access

    ARTICLE

    Predicting the Electronic and Structural Properties of Two-Dimensional Materials Using Machine Learning

    Ehsan Alibagheri1, Bohayra Mortazavi2, Timon Rabczuk3,4,*
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1287-1300, 2021, DOI:10.32604/cmc.2021.013564
    Abstract Machine-learning (ML) models are novel and robust tools to establish structure-to-property connection on the basis of computationally expensive ab-initio datasets. For advanced technologies, predicting novel materials and identifying their specification are critical issues. Two-dimensional (2D) materials are currently a rapidly growing class which show highly desirable properties for diverse advanced technologies. In this work, our objective is to search for desirable properties, such as the electronic band gap and total energy, among others, for which the accelerated prediction is highly appealing, prior to conducting accurate theoretical and experimental investigations. Among all available componential methods, gradient-boosted (GB) ML algorithms are known… More >

  • Open AccessOpen Access

    ARTICLE

    Load Balancing Algorithm for Migrating Switches in Software-Defined Vehicular Networks

    Himanshi Babbar1, Shalli Rani1,*, Mehedi Masud2, Sahil Verma3, Divya Anand4, Nz Jhanjhi5
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1301-1316, 2021, DOI:10.32604/cmc.2021.014627
    (This article belongs to the Special Issue: Emerging Trends in Cyber Security for Communication Networks)
    Abstract In Software-Defined Networks (SDN), the divergence of the control interface from the data plane provides a unique platform to develop a programmable and flexible network. A single controller, due to heavy load traffic triggered by different intelligent devices can not handle due to it’s restricted capability. To manage this, it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness. The flow of data through the multiple controllers also varies, resulting in an unequal distribution of load between different controllers. One major drawback of the multiple controllers is their constant configuration of the… More >

  • Open AccessOpen Access

    ARTICLE

    Detecting Information on the Spread of Dengue on Twitter Using Artificial Neural Networks

    Samina Amin1,*, M. Irfan Uddin1, M. Ali Zeb1, Ala Abdulsalam Alarood2, Marwan Mahmoud3, Monagi H. Alkinani4
    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1317-1332, 2021, DOI:10.32604/cmc.2021.014733
    (This article belongs to the Special Issue: Deep Learning and Parallel Computing for Intelligent and Efficient IoT)
    Abstract Social media platforms have lately emerged as a promising tool for predicting the outbreak of epidemics by analyzing information on them with the help of machine learning techniques. Many analytical and statistical models are available to infer a variety of user sentiments in posts on social media. The amount of data generated by social media platforms, such as Twitter, that can be used to track diseases is increasing rapidly. This paper proposes a method for the classification of tweets related to the outbreak of dengue using machine learning algorithms. An artificial neural network (ANN)-based method is developed using Global Vector… More >

Per Page:

Share Link