Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    AI Cannot Understand Memes: Experiments with OCR and Facial Emotions

    Ishaani Priyadarshini*, Chase Cotton

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 781-800, 2022, DOI:10.32604/cmc.2022.019284

    Abstract

    The increasing capabilities of Artificial Intelligence (AI), has led researchers and visionaries to think in the direction of machines outperforming humans by gaining intelligence equal to or greater than humans, which may not always have a positive impact on the society. AI gone rogue, and Technological Singularity are major concerns in academia as well as the industry. It is necessary to identify the limitations of machines and analyze their incompetence, which could draw a line between human and machine intelligence. Internet memes are an amalgam of pictures, videos, underlying messages, ideas, sentiments, humor, and experiences, hence the way an internet… More >

  • Open Access

    ARTICLE

    Isomorphic 2D/3D Objects and Saccadic Characteristics in Mental Rotation

    Akanksha Tiwari1, Ram Bilas Pachori1,2, Premjit Khanganba Sanjram1,3,4,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 433-450, 2022, DOI:10.32604/cmc.2022.019256

    Abstract Mental rotation (MR) is an important aspect of cognitive processing in gaming since transformation and manipulation of visuospatial information are necessary in order to execute a gaming task. This study provides insights on saccadic characteristics in gaming task performance that involves 2D and 3D isomorphic objects with varying angular disparity. Healthy participants (N =60) performed MR gaming task. Each participant was tested individually in an acoustic treated lab environment. Gaze behavior data of all participants were recorded during task execution and analyzed to find the changes in spatiotemporal characteristics of saccades associated with the variation in angular disparity and dimensionality. There… More >

  • Open Access

    ARTICLE

    Human Gait Recognition: A Deep Learning and Best Feature Selection Framework

    Asif Mehmood1, Muhammad Attique Khan2, Usman Tariq3, Chang-Won Jeong4, Yunyoung Nam5,*, Reham R. Mostafa6, Amira ElZeiny7

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 343-360, 2022, DOI:10.32604/cmc.2022.019250

    Abstract Background—Human Gait Recognition (HGR) is an approach based on biometric and is being widely used for surveillance. HGR is adopted by researchers for the past several decades. Several factors are there that affect the system performance such as the walking variation due to clothes, a person carrying some luggage, variations in the view angle. Proposed—In this work, a new method is introduced to overcome different problems of HGR. A hybrid method is proposed or efficient HGR using deep learning and selection of best features. Four major steps are involved in this work-preprocessing of the video frames, manipulation of the pre-trained… More >

  • Open Access

    ARTICLE

    An Optimized Fuzzy Based Ant Colony Algorithm for 5G-MANET

    R. Nithya1, K. Amudha2,*, A. Syed Musthafa3, Dilip Kumar Sharma4, Edwin Hernan Ramirez-Asis5, Priya Velayutham6, V. Subramaniyaswamy7, Sudhakar Sengan8

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1069-1087, 2022, DOI:10.32604/cmc.2022.019221

    Abstract The 5G demonstrations in a business has a significant role in today's fast-moving technology. Manet in 5G, drives a wireless system intended at an enormously high data rate, lower energy, low latency, and cost. For this reason, routing protocols of MANET have the possibility of being fundamentally flexible, high performance, and energy-efficient. The 5G communication aims to afford higher data rates and significantly low Over-The-Air latency. Motivated through supplementary ACO routing processes, a security-aware, fuzzy improved ant colony routing optimization protocol is proposed in MANETs. The goal is to develop a MANET routing protocol that could provide a stable packet… More >

  • Open Access

    ARTICLE

    Applying Machine Learning Techniques for Religious Extremism Detection on Online User Contents

    Shynar Mussiraliyeva1, Batyrkhan Omarov1,*, Paul Yoo1,2, Milana Bolatbek1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 915-934, 2022, DOI:10.32604/cmc.2022.019189

    Abstract In this research paper, we propose a corpus for the task of detecting religious extremism in social networks and open sources and compare various machine learning algorithms for the binary classification problem using a previously created corpus, thereby checking whether it is possible to detect extremist messages in the Kazakh language. To do this, the authors trained models using six classic machine-learning algorithms such as Support Vector Machine, Decision Tree, Random Forest, K Nearest Neighbors, Naive Bayes, and Logistic Regression. To increase the accuracy of detecting extremist texts, we used various characteristics such as Statistical Features, TF-IDF, POS, LIWC, and… More >

  • Open Access

    ARTICLE

    Three Dimensional Optimum Node Localization in Dynamic Wireless Sensor Networks

    Gagandeep Singh Walia1, Parulpreet Singh1, Manwinder Singh1, Mohamed Abouhawwash2,3, Hyung Ju Park4, Byeong-Gwon Kang4,*, Shubham Mahajan5, Amit Kant Pandit5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 305-321, 2022, DOI:10.32604/cmc.2022.019171

    Abstract Location information plays an important role in most of the applications in Wireless Sensor Network (WSN). Recently, many localization techniques have been proposed, while most of these deals with two Dimensional applications. Whereas, in Three Dimensional applications the task is complex and there are large variations in the altitude levels. In these 3D environments, the sensors are placed in mountains for tracking and deployed in air for monitoring pollution level. For such applications, 2D localization models are not reliable. Due to this, the design of 3D localization systems in WSNs faces new challenges. In this paper, in order to find… More >

  • Open Access

    ARTICLE

    Improving Routine Immunization Coverage Through Optimally Designed Predictive Models

    Fareeha Sameen1, Abdul Momin Kazi2, Majida Kazmi1,*, Munir A Abbasi3, Saad Ahmed Qazi1,4, Lampros K Stergioulas3,5

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 375-395, 2022, DOI:10.32604/cmc.2022.019167

    Abstract Routine immunization (RI) of children is the most effective and timely public health intervention for decreasing child mortality rates around the globe. Pakistan being a low-and-middle-income-country (LMIC) has one of the highest child mortality rates in the world occurring mainly due to vaccine-preventable diseases (VPDs). For improving RI coverage, a critical need is to establish potential RI defaulters at an early stage, so that appropriate interventions can be targeted towards such population who are identified to be at risk of missing on their scheduled vaccine uptakes. In this paper, a machine learning (ML) based predictive model has been proposed to… More >

  • Open Access

    ARTICLE

    Utilization of HEVC ChaCha20-Based Selective Encryption for Secure Telehealth Video Conferencing

    Osama S. Faragallah1,*, Ahmed I. Sallam2, Hala S. El-sayed3

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 831-845, 2022, DOI:10.32604/cmc.2022.019151

    Abstract Coronavirus (COVID-19) is a contagious disease that causes exceptional effect on healthcare organizations worldwide with dangerous impact on medical services within the hospitals. Because of the fast spread of COVID-19, the healthcare facilities could be a big source of disease infection. So, healthcare video consultations should be used to decrease face-to-face communication between clinician and patients. Healthcare video consultations may be beneficial for some COVID-19 conditions and reduce the need for face-to-face contact with a potentially positive patient without symptoms. These conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely, patients who consult… More >

  • Open Access

    ARTICLE

    Design of Computer Methods for the Solution of Cervical Cancer Epidemic Model

    Ali Raza1, Muhammad Rafiq2, Dalal Alrowaili3, Nauman Ahmed4, Ilyas Khan5,*, Kottakkaran Sooppy Nisar6, Muhammad Mohsin7

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1649-1666, 2022, DOI:10.32604/cmc.2022.019148

    Abstract Nonlinear modelling has a significant role in different disciplines of sciences such as behavioral, social, physical and biological sciences. The structural properties are also needed for such types of disciplines, as dynamical consistency, positivity and boundedness are the major requirements of the models in these fields. One more thing, this type of nonlinear model has no explicit solutions. For the sake of comparison its computation will be done by using different computational techniques. Regrettably, the aforementioned structural properties have not been restored in the existing computational techniques in literature. Therefore, the construction of structural preserving computational techniques are needed. The… More >

  • Open Access

    ARTICLE

    A Hybrid Approach for Network Intrusion Detection

    Mavra Mehmood1, Talha Javed2, Jamel Nebhen3, Sidra Abbas2,*, Rabia Abid1, Giridhar Reddy Bojja4, Muhammad Rizwan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 91-107, 2022, DOI:10.32604/cmc.2022.019127

    Abstract Due to the widespread use of the internet and smart devices, various attacks like intrusion, zero-day, Malware, and security breaches are a constant threat to any organization's network infrastructure. Thus, a Network Intrusion Detection System (NIDS) is required to detect attacks in network traffic. This paper proposes a new hybrid method for intrusion detection and attack categorization. The proposed approach comprises three steps to address high false and low false-negative rates for intrusion detection and attack categorization. In the first step, the dataset is preprocessed through the data transformation technique and min-max method. Secondly, the random forest recursive feature elimination… More >

Displaying 10831-10840 on page 1084 of 22098. Per Page