Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    Density Clustering Algorithm Based on KD-Tree and Voting Rules

    Hui Du, Zhiyuan Hu*, Depeng Lu, Jingrui Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3239-3259, 2024, DOI:10.32604/cmc.2024.046314 - 15 May 2024

    Abstract Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets with uneven density. Additionally, they incur substantial computational costs when applied to high-dimensional data due to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset and compute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similarity matrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a vote for the point with the highest density among its KNN. By utilizing the vote counts More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530 - 25 April 2024

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This… More >

  • Open Access

    ARTICLE

    Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture

    Usman Ahmad1, Muhammad Junaid Ali2, Faizan Ahmed Khan3, Arfat Ahmad Khan4, Arif Ur Rehman1, Malik Muhammad Ali Shahid5, Mohd Anul Haq6,*, Ilyas Khan7, Zamil S. Alzamil6, Ahmed Alhussen8

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2125-2140, 2023, DOI:10.32604/csse.2023.031008 - 03 November 2022

    Abstract Building an automatic fish recognition and detection system for large-scale fish classes is helpful for marine researchers and marine scientists because there are large numbers of fish species. However, it is quite difficult to build such systems owing to the lack of data imbalance problems and large number of classes. To solve these issues, we propose a transfer learning-based technique in which we use Efficient-Net, which is pre-trained on ImageNet dataset and fine-tuned on QuT Fish Database, which is a large scale dataset. Furthermore, prior to the activation layer, we use Global Average Pooling (GAP)… More >

  • Open Access

    ARTICLE

    Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention

    Shyla1,*, Vishal Bhatnagar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2431-2447, 2023, DOI:10.32604/iasc.2023.029126 - 19 July 2022

    Abstract The exponential pace of the spread of the digital world has served as one of the assisting forces to generate an enormous amount of information flowing over the network. The data will always remain under the threat of technological suffering where intruders and hackers consistently try to breach the security systems by gaining personal information insights. In this paper, the authors proposed the HDTbNB (Hybrid Decision Tree-based Naïve Bayes) algorithm to find the essential features without data scaling to maximize the model’s performance by reducing the false alarm rate and training period to reduce zero More >

  • Open Access

    ARTICLE

    Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk

    Polin Rahman1, Ahmed Rifat1, MD. IftehadAmjad Chy1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Sultan Aljahdali2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.021469 - 01 June 2022

    Abstract Heart failure is now widely spread throughout the world. Heart disease affects approximately 48% of the population. It is too expensive and also difficult to cure the disease. This research paper represents machine learning models to predict heart failure. The fundamental concept is to compare the correctness of various Machine Learning (ML) algorithms and boost algorithms to improve models’ accuracy for prediction. Some supervised algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Trees (DT), Random Forest (RF), Logistic Regression (LR) are considered to achieve the best results. Some boosting algorithms like Extreme Gradient… More >

  • Open Access

    ARTICLE

    Predict the Chances of Heart Abnormality in Diabetic Patients Through Machine Learning

    Monika Saraswat*, A. K. Wadhwani, Sulochana Wadhwani

    Journal on Artificial Intelligence, Vol.4, No.2, pp. 61-76, 2022, DOI:10.32604/jai.2022.028140 - 18 July 2022

    Abstract Today, more families are affected by Diabetes Mellitus (DM) disease on account of its continually increasing occurrence. Most patients remain unknown about their health quality or the DM’s risk factors prior to diagnosis. The medical world has witnessed that individuals are affected by two different diabetes namely a) Type-1 diabetes (T1D), as well as b) Type-2 diabetes (T2D). As Type 2 Diabetes affects the other organs of the body, the proposed system concentrates specifically on Type 2 Diabetes. This work aims to ascertain the cardiac disorder in T2D patients. As of the ECG dataset, the… More >

  • Open Access

    ARTICLE

    Handling High Dimensionality in Ensemble Learning for Arrhythmia Prediction

    Fuad Ali Mohammed Al-Yarimi*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1729-1742, 2022, DOI:10.32604/iasc.2022.022418 - 09 December 2021

    Abstract Computer-aided arrhythmia prediction from ECG (electrocardiograms) is essential in clinical practices, which promises to reduce the mortality caused by inexperienced clinical practitioners. Moreover, computer-aided methods often succeed in the early detection of arrhythmia scope from electrocardiogram reports. Machine learning is the buzz of computer-aided clinical practices. Particularly, computer-aided arrhythmia prediction methods highly adopted machine learning methods. However, the high dimensionality in feature values considered for the machine learning models’ training phase often causes false alarming. This manuscript addressed the high dimensionality in the learning phase and proposed an (Ensemble Learning method for Arrhythmia Prediction) ELAP… More >

  • Open Access

    ARTICLE

    Position Vectors Based Efficient Indoor Positioning System

    Ayesha Javed1, Mir Yasir Umair1,*, Alina Mirza1, Abdul Wakeel1, Fazli Subhan2, Wazir Zada Khan3

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1781-1799, 2021, DOI:10.32604/cmc.2021.015229 - 05 February 2021

    Abstract With the advent and advancements in the wireless technologies, Wi-Fi fingerprinting-based Indoor Positioning System (IPS) has become one of the most promising solutions for localization in indoor environments. Unlike the outdoor environment, the lack of line-of-sight propagation in an indoor environment keeps the interest of the researchers to develop efficient and precise positioning systems that can later be incorporated in numerous applications involving Internet of Things (IoTs) and green computing. In this paper, we have proposed a technique that combines the capabilities of multiple algorithms to overcome the complexities experienced indoors. Initially, in the database… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594 - 28 December 2020

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to… More >

Displaying 1-10 on page 1 of 9. Per Page