Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (296)
  • Open Access

    ARTICLE

    Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset

    Mohammed Abdalsalam1,*, Chunlin Li1, Abdelghani Dahou2, Natalia Kryvinska3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1427-1467, 2024, DOI:10.32604/cmes.2023.029911

    Abstract One of the biggest dangers to society today is terrorism, where attacks have become one of the most significant risks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) have become the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management, medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related, initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terrorist attacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556

    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework to develop a secure online… More >

  • Open Access

    ARTICLE

    Speech Recognition via CTC-CNN Model

    Wen-Tsai Sung1, Hao-Wei Kang1, Sung-Jung Hsiao2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3833-3858, 2023, DOI:10.32604/cmc.2023.040024

    Abstract In the speech recognition system, the acoustic model is an important underlying model, and its accuracy directly affects the performance of the entire system. This paper introduces the construction and training process of the acoustic model in detail and studies the Connectionist temporal classification (CTC) algorithm, which plays an important role in the end-to-end framework, established a convolutional neural network (CNN) combined with an acoustic model of Connectionist temporal classification to improve the accuracy of speech recognition. This study uses a sound sensor, ReSpeaker Mic Array v2.0.1, to convert the collected speech signals into text or corresponding speech signals to… More >

  • Open Access

    ARTICLE

    Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features

    Nida Aslam1,*, Irfan Ullah Khan2, Salma Abdulrahman Bader2, Aisha Alansari3, Lama Abdullah Alaqeel2, Razan Mohammed Khormy2, Zahra Abdultawab AlKubaish2, Tariq Hussain4,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3167-3188, 2023, DOI:10.32604/cmc.2023.039721

    Abstract One of the most widely used smartphone operating systems, Android, is vulnerable to cutting-edge malware that employs sophisticated logic. Such malware attacks could lead to the execution of unauthorized acts on the victims’ devices, stealing personal information and causing hardware damage. In previous studies, machine learning (ML) has shown its efficacy in detecting malware events and classifying their types. However, attackers are continuously developing more sophisticated methods to bypass detection. Therefore, up-to-date datasets must be utilized to implement proactive models for detecting malware events in Android mobile devices. Therefore, this study employed ML algorithms to classify Android applications into malware… More >

  • Open Access

    EDITORIAL

    Hot Topics of Molecular and Cellular Biomechanics in 2022

    Guixue Wang1,2,*

    Molecular & Cellular Biomechanics, Vol.20, No.2, pp. 63-66, 2023, DOI:10.32604/mcb.2023.044564

    Abstract The analysis of biomechanical characteristics plays an important role in mastering the technical characteristics of athletes, providing guidance for the formulation and prevention of sports injury training plans and providing theoretical support for research on injury prevention and stability control in the sports field. With the importance of data analysis, the application scope of artificial intelligence methods is more extensive. For example, intelligent training systems can be used for athletes’ personalized and professional training, real-time monitoring and feedback of training data, and further reduce the risk of sports injury. However, deep learning methods process a large number of medical images… More >

  • Open Access

    REVIEW

    Embracing the Future: AI and ML Transforming Urban Environments in Smart Cities

    Gagan Deep*, Jyoti Verma

    Journal on Artificial Intelligence, Vol.5, pp. 57-73, 2023, DOI:10.32604/jai.2023.043329

    Abstract This research explores the increasing importance of Artificial Intelligence (AI) and Machine Learning (ML) with relation to smart cities. It discusses the AI and ML’s ability to revolutionize various aspects of urban environments, including infrastructure, governance, public safety, and sustainability. The research presents the definition and characteristics of smart cities, highlighting the key components and technologies driving initiatives for smart cities. The methodology employed in this study involved a comprehensive review of relevant literature, research papers, and reports on the subject of AI and ML in smart cities. Various sources were consulted to gather information on the integration of AI… More >

  • Open Access

    EDITORIAL

    Grad-CAM: Understanding AI Models

    Shuihua Wang1,2, Yudong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1321-1324, 2023, DOI:10.32604/cmc.2023.041419

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Deep Fakes in Healthcare: How Deep Learning Can Help to Detect Forgeries

    Alaa Alsaheel, Reem Alhassoun, Reema Alrashed, Noura Almatrafi, Noura Almallouhi, Saleh Albahli*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2461-2482, 2023, DOI:10.32604/cmc.2023.040257

    Abstract With the increasing use of deep learning technology, there is a growing concern over creating deep fake images and videos that can potentially be used for fraud. In healthcare, manipulating medical images could lead to misdiagnosis and potentially life-threatening consequences. Therefore, the primary purpose of this study is to explore the use of deep learning algorithms to detect deep fake images by solving the problem of recognizing the handling of samples of cancer and other diseases. Therefore, this research proposes a framework that leverages state-of-the-art deep convolutional neural networks (CNN) and a large dataset of authentic and deep fake medical… More >

  • Open Access

    ARTICLE

    Explainable Artificial Intelligence-Based Model Drift Detection Applicable to Unsupervised Environments

    Yongsoo Lee, Yeeun Lee, Eungyu Lee, Taejin Lee*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1701-1719, 2023, DOI:10.32604/cmc.2023.040235

    Abstract Cybersecurity increasingly relies on machine learning (ML) models to respond to and detect attacks. However, the rapidly changing data environment makes model life-cycle management after deployment essential. Real-time detection of drift signals from various threats is fundamental for effectively managing deployed models. However, detecting drift in unsupervised environments can be challenging. This study introduces a novel approach leveraging Shapley additive explanations (SHAP), a widely recognized explainability technique in ML, to address drift detection in unsupervised settings. The proposed method incorporates a range of plots and statistical techniques to enhance drift detection reliability and introduces a drift suspicion metric that considers… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Action Classification Using One-Shot Object Detection

    Hyun Yoo1, Seo-El Lee2, Kyungyong Chung3,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1343-1359, 2023, DOI:10.32604/cmc.2023.039263

    Abstract Deep learning-based action classification technology has been applied to various fields, such as social safety, medical services, and sports. Analyzing an action on a practical level requires tracking multiple human bodies in an image in real-time and simultaneously classifying their actions. There are various related studies on the real-time classification of actions in an image. However, existing deep learning-based action classification models have prolonged response speeds, so there is a limit to real-time analysis. In addition, it has low accuracy of action of each object if multiple objects appear in the image. Also, it needs to be improved since it… More >

Displaying 21-30 on page 3 of 296. Per Page