Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting

    Milos Dobrojevic1,4, Luka Jovanovic1, Lepa Babic3, Miroslav Cajic5, Tamara Zivkovic6, Miodrag Zivkovic2, Suresh Muthusamy7, Milos Antonijevic2, Nebojsa Bacanin2,4,8,9,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4997-5027, 2024, DOI:10.32604/cmc.2024.054459 - 12 September 2024

    Abstract Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones, computers, or tablets. It can occur through various channels, such as social media, text messages, online forums, or gaming platforms. Cyberbullying involves using technology to intentionally harm, harass, or intimidate others and may take different forms, including exclusion, doxing, impersonation, harassment, and cyberstalking. Unfortunately, due to the rapid growth of malicious internet users, this social phenomenon is becoming more frequent, and there is a huge need to address this issue. Therefore, the main goal of the research… More >

  • Open Access

    ARTICLE

    Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats

    G. Sunil Santhosh Kumar1,2,*, M. Rudra Kumar3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 695-713, 2024, DOI:10.32604/cmc.2024.050143 - 18 July 2024

    Abstract This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost, a machine learning algorithm renowned for its efficiency and performance. The framework proposed herein utilizes the fusion of diversified feature formats, specifically, metadata, textual, and pattern features. The goal is to enhance the system’s ability to discern and generalize transformation rules from source to destination formats in varied contexts. Firstly, the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model. Subsequent sections expound… More >

  • Open Access

    ARTICLE

    Developing a Model for Parkinson’s Disease Detection Using Machine Learning Algorithms

    Naif Al Mudawi*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4945-4962, 2024, DOI:10.32604/cmc.2024.048967 - 20 June 2024

    Abstract Parkinson’s disease (PD) is a chronic neurological condition that progresses over time. People start to have trouble speaking, writing, walking, or performing other basic skills as dopamine-generating neurons in some brain regions are injured or die. The patient’s symptoms become more severe due to the worsening of their signs over time. In this study, we applied state-of-the-art machine learning algorithms to diagnose Parkinson’s disease and identify related risk factors. The research worked on the publicly available dataset on PD, and the dataset consists of a set of significant characteristics of PD. We aim to apply… More >

  • Open Access

    ARTICLE

    Research on the Icing Diagnosis of Wind Turbine Blades Based on FS–XGBoost–EWMA

    Jicai Guo1,2, Xiaowen Song1,2,*, Chang Liu1,2, Yanfeng Zhang1,2, Shijie Guo1,2, Jianxin Wu1,2, Chang Cai3, Qing’an Li3,*

    Energy Engineering, Vol.121, No.7, pp. 1739-1758, 2024, DOI:10.32604/ee.2024.048854 - 11 June 2024

    Abstract In winter, wind turbines are susceptible to blade icing, which results in a series of energy losses and safe operation problems. Therefore, blade icing detection has become a top priority. Conventional methods primarily rely on sensor monitoring, which is expensive and has limited applications. Data-driven blade icing detection methods have become feasible with the development of artificial intelligence. However, the data-driven method is plagued by limited training samples and icing samples; therefore, this paper proposes an icing warning strategy based on the combination of feature selection (FS), eXtreme Gradient Boosting (XGBoost) algorithm, and exponentially weighted… More >

  • Open Access

    ARTICLE

    Migratable Power System Transient Stability Assessment Method Based on Improved XGBoost

    Ying Qu1, Jinhao Wang1, Xueting Cheng1, Jie Hao1, Weiru Wang1, Zhewen Niu2, Yuxiang Wu2,*

    Energy Engineering, Vol.121, No.7, pp. 1847-1863, 2024, DOI:10.32604/ee.2024.048300 - 11 June 2024

    Abstract The data-driven transient stability assessment (TSA) of power systems can predict online real-time prediction by learning the temporal features before and after faults. However, the accuracy of the assessment is limited by the quality of the data and has weak transferability. Based on this, this paper proposes a method for TSA of power systems based on an improved extreme gradient boosting (XGBoost) model. Firstly, the gradient detection method is employed to remove noise interference while maintaining the original time series trend. On this basis, a focal loss function is introduced to guide the training of… More >

  • Open Access

    ARTICLE

    Image Fusion Using Wavelet Transformation and XGboost Algorithm

    Shahid Naseem1, Tariq Mahmood2,3, Amjad Rehman Khan2, Umer Farooq1, Samra Nawazish4, Faten S. Alamri5,*, Tanzila Saba2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 801-817, 2024, DOI:10.32604/cmc.2024.047623 - 25 April 2024

    Abstract Recently, there have been several uses for digital image processing. Image fusion has become a prominent application in the domain of imaging processing. To create one final image that proves more informative and helpful compared to the original input images, image fusion merges two or more initial images of the same item. Image fusion aims to produce, enhance, and transform significant elements of the source images into combined images for the sake of human visual perception. Image fusion is commonly employed for feature extraction in smart robots, clinical imaging, audiovisual camera integration, manufacturing process monitoring,… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074 - 30 January 2024

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, More >

  • Open Access

    ARTICLE

    A New Method for Diagnosis of Leukemia Utilizing a Hybrid DL-ML Approach for Binary and Multi-Class Classification on a Limited-Sized Database

    Nilkanth Mukund Deshpande1,2, Shilpa Gite3,4,*, Biswajeet Pradhan5,6, Abdullah Alamri7, Chang-Wook Lee8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 593-631, 2024, DOI:10.32604/cmes.2023.030704 - 30 December 2023

    Abstract Infection of leukemia in humans causes many complications in its later stages. It impairs bone marrow’s ability to produce blood. Morphological diagnosis of human blood cells is a well-known and well-proven technique for diagnosis in this case. The binary classification is employed to distinguish between normal and leukemia-infected cells. In addition, various subtypes of leukemia require different treatments. These sub-classes must also be detected to obtain an accurate diagnosis of the type of leukemia. This entails using multi-class classification to determine the leukemia subtype. This is usually done using a microscopic examination of these blood… More > Graphic Abstract

    A New Method for Diagnosis of Leukemia Utilizing a Hybrid DL-ML Approach for Binary and Multi-Class Classification on a Limited-Sized Database

  • Open Access

    ARTICLE

    Recognizing Breast Cancer Using Edge-Weighted Texture Features of Histopathology Images

    Arslan Akram1,2, Javed Rashid2,3,4, Fahima Hajjej5, Sobia Yaqoob1,6, Muhammad Hamid7, Asma Irshad8, Nadeem Sarwar9,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1081-1101, 2023, DOI:10.32604/cmc.2023.041558 - 31 October 2023

    Abstract Around one in eight women will be diagnosed with breast cancer at some time. Improved patient outcomes necessitate both early detection and an accurate diagnosis. Histological images are routinely utilized in the process of diagnosing breast cancer. Methods proposed in recent research only focus on classifying breast cancer on specific magnification levels. No study has focused on using a combined dataset with multiple magnification levels to classify breast cancer. A strategy for detecting breast cancer is provided in the context of this investigation. Histopathology image texture data is used with the wavelet transform in this… More >

  • Open Access

    ARTICLE

    Internet of Things (IoT) Security Enhancement Using XGboost Machine Learning Techniques

    Dana F. Doghramachi1,*, Siddeeq Y. Ameen2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 717-732, 2023, DOI:10.32604/cmc.2023.041186 - 31 October 2023

    Abstract The rapid adoption of the Internet of Things (IoT) across industries has revolutionized daily life by providing essential services and leisure activities. However, the inadequate software protection in IoT devices exposes them to cyberattacks with severe consequences. Intrusion Detection Systems (IDS) are vital in mitigating these risks by detecting abnormal network behavior and monitoring safe network traffic. The security research community has shown particular interest in leveraging Machine Learning (ML) approaches to develop practical IDS applications for general cyber networks and IoT environments. However, most available datasets related to Industrial IoT suffer from imbalanced class… More >

Displaying 1-10 on page 1 of 43. Per Page