Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (149)
  • Open Access

    REVIEW

    Software Reliability Prediction Using Ensemble Learning on Selected Features in Imbalanced and Balanced Datasets: A Review

    Suneel Kumar Rath1, Madhusmita Sahu1, Shom Prasad Das2, Junali Jasmine Jena3, Chitralekha Jena4, Baseem Khan5,6,7,*, Ahmed Ali7, Pitshou Bokoro7

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1513-1536, 2024, DOI:10.32604/csse.2024.057067 - 22 November 2024

    Abstract Redundancy, correlation, feature irrelevance, and missing samples are just a few problems that make it difficult to analyze software defect data. Additionally, it might be challenging to maintain an even distribution of data relating to both defective and non-defective software. The latter software class’s data are predominately present in the dataset in the majority of experimental situations. The objective of this review study is to demonstrate the effectiveness of combining ensemble learning and feature selection in improving the performance of defect classification. Besides the successful feature selection approach, a novel variant of the ensemble learning… More >

  • Open Access

    REVIEW

    A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions

    Monirah Al-Ajlan*, Mourad Ykhlef

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2053-2076, 2024, DOI:10.32604/cmc.2024.055891 - 18 November 2024

    Abstract The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems (IDSs). IDSs have become a research hotspot and have seen remarkable performance improvements. Generative adversarial networks (GANs) have also garnered increasing research interest recently due to their remarkable ability to generate data. This paper investigates the application of (GANs) in (IDS) and explores their current use within this research field. We delve into the adoption of GANs within signature-based, anomaly-based, and hybrid IDSs, focusing on their objectives, methodologies, and advantages. Overall, GANs have been widely employed, mainly focused on solving the More >

  • Open Access

    ARTICLE

    Optimizing Internet of Things Device Security with a Globalized Firefly Optimization Algorithm for Attack Detection

    Arkan Kh Shakr Sabonchi*

    Journal on Artificial Intelligence, Vol.6, pp. 261-282, 2024, DOI:10.32604/jai.2024.056552 - 18 October 2024

    Abstract The phenomenal increase in device connectivity is making the signaling and resource-based operational integrity of networks at the node level increasingly prone to distributed denial of service (DDoS) attacks. The current growth rate in the number of Internet of Things (IoT) attacks executed at the time of exchanging data over the Internet represents massive security hazards to IoT devices. In this regard, the present study proposes a new hybrid optimization technique that combines the firefly optimization algorithm with global searches for use in attack detection on IoT devices. We preprocessed two datasets, CICIDS and UNSW-NB15,… More >

  • Open Access

    ARTICLE

    Industrial Fusion Cascade Detection of Solder Joint

    Chunyuan Li1,2,3, Peng Zhang1,2,3, Shuangming Wang4, Lie Liu4, Mingquan Shi2,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1197-1214, 2024, DOI:10.32604/cmc.2024.055893 - 15 October 2024

    Abstract With the remarkable advancements in machine vision research and its ever-expanding applications, scholars have increasingly focused on harnessing various vision methodologies within the industrial realm. Specifically, detecting vehicle floor welding points poses unique challenges, including high operational costs and limited portability in practical settings. To address these challenges, this paper innovatively integrates template matching and the Faster RCNN algorithm, presenting an industrial fusion cascaded solder joint detection algorithm that seamlessly blends template matching with deep learning techniques. This algorithm meticulously weights and fuses the optimized features of both methodologies, enhancing the overall detection capabilities. Furthermore,… More >

  • Open Access

    ARTICLE

    Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data

    Fahim Nasir1, Abdulghani Ali Ahmed1,*, Mehmet Sabir Kiraz1, Iryna Yevseyeva1, Mubarak Saif2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1703-1728, 2024, DOI:10.32604/cmc.2024.055192 - 15 October 2024

    Abstract Integrating machine learning and data mining is crucial for processing big data and extracting valuable insights to enhance decision-making. However, imbalanced target variables within big data present technical challenges that hinder the performance of supervised learning classifiers on key evaluation metrics, limiting their overall effectiveness. This study presents a comprehensive review of both common and recently developed Supervised Learning Classifiers (SLCs) and evaluates their performance in data-driven decision-making. The evaluation uses various metrics, with a particular focus on the Harmonic Mean Score (F-1 score) on an imbalanced real-world bank target marketing dataset. The findings indicate… More >

  • Open Access

    ARTICLE

    Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems

    Naeem Raza1, Muhammad Asif Habib1, Mudassar Ahmad1, Qaisar Abbas2,*, Mutlaq B. Aldajani2, Muhammad Ahsan Latif3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 911-931, 2024, DOI:10.32604/cmc.2024.055049 - 15 October 2024

    Abstract Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time. To evaluate vision-based vehicle detection performance in foggy weather conditions, state-of-the-art Vehicle Detection in Adverse Weather Nature (DAWN) and Foggy Driving (FD) datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle… More >

  • Open Access

    ARTICLE

    Development of a Lightweight Model for Handwritten Dataset Recognition: Bangladeshi City Names in Bangla Script

    Md. Mahbubur Rahman Tusher1, Fahmid Al Farid2,*, Md. Al-Hasan1, Abu Saleh Musa Miah1, Susmita Roy Rinky1, Mehedi Hasan Jim1, Sarina Mansor2, Md. Abdur Rahim3, Hezerul Abdul Karim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2633-2656, 2024, DOI:10.32604/cmc.2024.049296 - 15 August 2024

    Abstract The context of recognizing handwritten city names, this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla script. In today’s technology-driven era, where precise tools for reading handwritten text are essential, this study focuses on leveraging deep learning to understand the intricacies of Bangla handwriting. The existing dearth of dedicated datasets has impeded the progress of Bangla handwritten city name recognition systems, particularly in critical areas such as postal automation and document processing. Notably, no prior research has specifically targeted the unique needs of Bangla handwritten city name… More >

  • Open Access

    ARTICLE

    Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1457-1490, 2024, DOI:10.32604/cmc.2024.051996 - 18 July 2024

    Abstract This study describes improving network security by implementing and assessing an intrusion detection system (IDS) based on deep neural networks (DNNs). The paper investigates contemporary technical ways for enhancing intrusion detection performance, given the vital relevance of safeguarding computer networks against harmful activity. The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset, a popular benchmark for IDS research. The model performs well in both the training and validation stages, with 91.30% training accuracy and 94.38% validation accuracy. Thus, the model shows good learning and generalization capabilities with minor losses of… More >

  • Open Access

    REVIEW

    A Comprehensive Systematic Review: Advancements in Skin Cancer Classification and Segmentation Using the ISIC Dataset

    Madiha Hameed1,3, Aneela Zameer1,*, Muhammad Asif Zahoor Raja2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2131-2164, 2024, DOI:10.32604/cmes.2024.050124 - 08 July 2024

    Abstract The International Skin Imaging Collaboration (ISIC) datasets are pivotal resources for researchers in machine learning for medical image analysis, especially in skin cancer detection. These datasets contain tens of thousands of dermoscopic photographs, each accompanied by gold-standard lesion diagnosis metadata. Annual challenges associated with ISIC datasets have spurred significant advancements, with research papers reporting metrics surpassing those of human experts. Skin cancers are categorized into melanoma and non-melanoma types, with melanoma posing a greater threat due to its rapid potential for metastasis if left untreated. This paper aims to address challenges in skin cancer detection… More >

  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949 - 20 June 2024

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

Displaying 1-10 on page 1 of 149. Per Page