Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Improving Prediction of Chronic Kidney Disease Using KNN Imputed SMOTE Features and TrioNet Model

    Nazik Alturki1, Abdulaziz Altamimi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Shtwai Alsubai4, Marwan Omar5, Imran Ashraf6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3513-3534, 2024, DOI:10.32604/cmes.2023.045868

    Abstract Chronic kidney disease (CKD) is a major health concern today, requiring early and accurate diagnosis. Machine learning has emerged as a powerful tool for disease detection, and medical professionals are increasingly using ML classifier algorithms to identify CKD early. This study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California, UC Irvine Machine Learning repository. The research introduces TrioNet, an ensemble model combining extreme gradient boosting, random forest, and extra tree classifier, which excels in providing highly accurate predictions for CKD. Furthermore, K nearest neighbor (KNN) imputer is utilized to deal… More >

  • Open Access

    ARTICLE

    Sentence Level Analysis Model for Phishing Detection Using KNN

    Lindah Sawe*, Joyce Gikandi, John Kamau, David Njuguna

    Journal of Cyber Security, Vol.6, pp. 25-39, 2024, DOI:10.32604/jcs.2023.045859

    Abstract Phishing emails have experienced a rapid surge in cyber threats globally, especially following the emergence of the COVID-19 pandemic. This form of attack has led to substantial financial losses for numerous organizations. Although various models have been constructed to differentiate legitimate emails from phishing attempts, attackers continuously employ novel strategies to manipulate their targets into falling victim to their schemes. This form of attack has led to substantial financial losses for numerous organizations. While efforts are ongoing to create phishing detection models, their current level of accuracy and speed in identifying phishing emails is less than satisfactory. Additionally, there has… More >

  • Open Access

    ARTICLE

    Force Sensitive Resistors-Based Real-Time Posture Detection System Using Machine Learning Algorithms

    Arsal Javaid1, Areeb Abbas1, Jehangir Arshad1, Mohammad Khalid Imam Rahmani2,*, Sohaib Tahir Chauhdary3, Mujtaba Hussain Jaffery1, Abdulbasid S. Banga2,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1795-1814, 2023, DOI:10.32604/cmc.2023.044140

    Abstract To detect the improper sitting posture of a person sitting on a chair, a posture detection system using machine learning classification has been proposed in this work. The addressed problem correlates to the third Sustainable Development Goal (SDG), ensuring healthy lives and promoting well-being for all ages, as specified by the World Health Organization (WHO). An improper sitting position can be fatal if one sits for a long time in the wrong position, and it can be dangerous for ulcers and lower spine discomfort. This novel study includes a practical implementation of a cushion consisting of a grid of 3… More >

  • Open Access

    ARTICLE

    CNN Based Features Extraction and Selection Using EPO Optimizer for Cotton Leaf Diseases Classification

    Mehwish Zafar1, Javeria Amin2, Muhammad Sharif1, Muhammad Almas Anjum3, Seifedine Kadry4,5,6, Jungeun Kim7,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2779-2793, 2023, DOI:10.32604/cmc.2023.035860

    Abstract Worldwide cotton is the most profitable cash crop. Each year the production of this crop suffers because of several diseases. At an early stage, computerized methods are used for disease detection that may reduce the loss in the production of cotton. Although several methods are proposed for the detection of cotton diseases, however, still there are limitations because of low-quality images, size, shape, variations in orientation, and complex background. Due to these factors, there is a need for novel methods for features extraction/selection for the accurate cotton disease classification. Therefore in this research, an optimized features fusion-based model is proposed,… More >

  • Open Access

    ARTICLE

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

    Song Wang1,*, Fei Xie1, Fengye Yang1, Shengxuan Qiu1, Chuang Liu2, Tong Li3

    Energy Engineering, Vol.120, No.10, pp. 2273-2285, 2023, DOI:10.32604/ee.2023.030107

    Abstract Winding is one of the most important components in power transformers. Ensuring the health state of the winding is of great importance to the stable operation of the power system. To efficiently and accurately diagnose the disc space variation (DSV) fault degree of transformer winding, this paper presents a diagnostic method of winding fault based on the K-Nearest Neighbor (KNN) algorithm and the frequency response analysis (FRA) method. First, a laboratory winding model is used, and DSV faults with four different degrees are achieved by changing disc space of the discs in the winding. Then, a series of FRA tests… More > Graphic Abstract

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

  • Open Access

    ARTICLE

    Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption

    Chen Wang1, Jian Xu1,*, Jiarun Li1, Yan Dong1, Nitin Naik2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1421-1436, 2023, DOI:10.32604/iasc.2023.034123

    Abstract Outsourcing the k-Nearest Neighbor (kNN) classifier to the cloud is useful, yet it will lead to serious privacy leakage due to sensitive outsourced data and models. In this paper, we design, implement and evaluate a new system employing an outsourced privacy-preserving kNN Classifier Model based on Multi-Key Homomorphic Encryption (kNNCM-MKHE). We firstly propose a security protocol based on Multi-key Brakerski-Gentry-Vaikuntanathan (BGV) for collaborative evaluation of the kNN classifier provided by multiple model owners. Analyze the operations of kNN and extract basic operations, such as addition, multiplication, and comparison. It supports the computation of encrypted data with different public keys. At… More >

  • Open Access

    ARTICLE

    Classification of Multi-view Digital Mammogram Images Using SMO-WkNN

    P. Malathi1,*, G. Charlyn Pushpa Latha2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1741-1758, 2023, DOI:10.32604/csse.2023.035185

    Abstract Breast cancer (BCa) is a leading cause of death in the female population across the globe. Approximately 2.3 million new BCa cases are recorded globally in females, overtaking lung cancer as the most prevalent form of cancer to be diagnosed. However, the mortality rates for cervical and BCa are significantly higher in developing nations than in developed countries. Early diagnosis is the only option to minimize the risks of BCa. Deep learning (DL)-based models have performed well in image processing in recent years, particularly convolutional neural network (CNN). Hence, this research proposes a DL-based CNN model to diagnose BCa from… More >

  • Open Access

    ARTICLE

    Weight Prediction Using the Hybrid Stacked-LSTM Food Selection Model

    Ahmed M. Elshewey1, Mahmoud Y. Shams2,*, Zahraa Tarek3, Mohamed Megahed4, El-Sayed M. El-kenawy5, Mohamed A. El-dosuky3,6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 765-781, 2023, DOI:10.32604/csse.2023.034324

    Abstract Food choice motives (i.e., mood, health, natural content, convenience, sensory appeal, price, familiarities, ethical concerns, and weight control) have an important role in transforming the current food system to ensure the healthiness of people and the sustainability of the world. Researchers from several domains have presented several models addressing issues influencing food choice over the years. However, a multidisciplinary approach is required to better understand how various aspects interact with one another during the decision-making procedure. In this paper, four Deep Learning (DL) models and one Machine Learning (ML) model are utilized to predict the weight in pounds based on… More >

  • Open Access

    ARTICLE

    Effective and Efficient Video Compression by the Deep Learning Techniques

    Karthick Panneerselvam1,2,*, K. Mahesh1, V. L. Helen Josephine3, A. Ranjith Kumar2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1047-1061, 2023, DOI:10.32604/csse.2023.030513

    Abstract Deep learning has reached many successes in Video Processing. Video has become a growing important part of our daily digital interactions. The advancement of better resolution content and the large volume offers serious challenges to the goal of receiving, distributing, compressing and revealing high-quality video content. In this paper we propose a novel Effective and Efficient video compression by the Deep Learning framework based on the flask, which creatively combines the Deep Learning Techniques on Convolutional Neural Networks (CNN) and Generative Adversarial Networks (GAN). The video compression method involves the layers are divided into different groups for data processing, using… More >

  • Open Access

    ARTICLE

    Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, SyedaWajiha Zahra1, Muhammad Rashid2, Shahab S. Band3,*, Amir Mosavi4,5,6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2641-2659, 2023, DOI:10.32604/cmc.2023.028796

    Abstract Cloud computing is one of the most attractive and cost-saving models, which provides online services to end-users. Cloud computing allows the user to access data directly from any node. But nowadays, cloud security is one of the biggest issues that arise. Different types of malware are wreaking havoc on the clouds. Attacks on the cloud server are happening from both internal and external sides. This paper has developed a tool to prevent the cloud server from spamming attacks. When an attacker attempts to use different spamming techniques on a cloud server, the attacker will be intercepted through two effective techniques:… More >

Displaying 1-10 on page 1 of 34. Per Page