Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Employment Quality Evaluation Model Based on Hybrid Intelligent Algorithm

    Xianhui Gu1,*, Xiaokan Wang1, Shuang Liang2

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 131-139, 2023, DOI:10.32604/cmc.2023.028756 - 22 September 2022

    Abstract In order to solve the defect of large error in current employment quality evaluation, an employment quality evaluation model based on grey correlation degree method and fuzzy C-means (FCM) is proposed. Firstly, it analyzes the related research work of employment quality evaluation, establishes the employment quality evaluation index system, collects the index data, and normalizes the index data; Then, the weight value of employment quality evaluation index is determined by Grey relational analysis method, and some unimportant indexes are removed; Finally, the employment quality evaluation model is established by using fuzzy cluster analysis algorithm, and More >

  • Open Access

    ARTICLE

    Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction

    S. J. K. Jagadeesh Kumar1, P. Parthasarathi2, Mehedi Masud3, Jehad F. Al-Amri4, Mohamed Abouhawwash5,6,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2909-2924, 2023, DOI:10.32604/iasc.2023.030335 - 17 August 2022

    Abstract The main task of thyroid hormones is controlling the metabolism rate of humans, the development of neurons, and the significant growth of reproductive activities. In medical science, thyroid disorder will lead to creating thyroiditis and thyroid cancer. The two main thyroid disorders are hyperthyroidism and hypothyroidism. Many research works focus on the prediction of thyroid disorder. To improve the accuracy in the classification of thyroid disorder this paper proposes optimization-based feature selection by using differential evolution with the Butterfly optimization algorithm (DE-BOA). For the classifier fuzzy C-means algorithm (FCM) is used. The proposed DEBOA-FCM is More >

  • Open Access

    ARTICLE

    A Quasi-Newton Neural Network Based Efficient Intrusion Detection System for Wireless Sensor Network

    A. Gautami1,*, J. Shanthini2, S. Karthik3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 427-443, 2023, DOI:10.32604/csse.2023.026688 - 16 August 2022

    Abstract In Wireless Sensor Networks (WSN), attacks mostly aim in limiting or eliminating the capability of the network to do its normal function. Detecting this misbehaviour is a demanding issue. And so far the prevailing research methods show poor performance. AQN3 centred efficient Intrusion Detection Systems (IDS) is proposed in WSN to ameliorate the performance. The proposed system encompasses Data Gathering (DG) in WSN as well as Intrusion Detection (ID) phases. In DG, the Sensor Nodes (SN) is formed as clusters in the WSN and the Distance-based Fruit Fly Fuzzy c-means (DFFF) algorithm chooses the Cluster… More >

  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850 - 25 May 2023

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs.… More >

  • Open Access

    ARTICLE

    Energy Price Forecasting Through Novel Fuzzy Type-1 Membership Functions

    Muhammad Hamza Azam1, Mohd Hilmi Hasan1,*, Azlinda A Malik2, Saima Hassan3, Said Jadid Abdulkadir1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1799-1815, 2022, DOI:10.32604/cmc.2022.028292 - 18 May 2022

    Abstract Electricity price forecasting is a subset of energy and power forecasting that focuses on projecting commercial electricity market present and future prices. Electricity price forecasting have been a critical input to energy corporations’ strategic decision-making systems over the last 15 years. Many strategies have been utilized for price forecasting in the past, however Artificial Intelligence Techniques (Fuzzy Logic and ANN) have proven to be more efficient than traditional techniques (Regression and Time Series). Fuzzy logic is an approach that uses membership functions (MF) and fuzzy inference model to forecast future electricity prices. Fuzzy c-means (FCM)… More >

  • Open Access

    ARTICLE

    An Efficient Deep Learning-based Content-based Image Retrieval Framework

    M. Sivakumar1,*, N. M. Saravana Kumar2, N. Karthikeyan1

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 683-700, 2022, DOI:10.32604/csse.2022.021459 - 20 April 2022

    Abstract The use of massive image databases has increased drastically over the few years due to evolution of multimedia technology. Image retrieval has become one of the vital tools in image processing applications. Content-Based Image Retrieval (CBIR) has been widely used in varied applications. But, the results produced by the usage of a single image feature are not satisfactory. So, multiple image features are used very often for attaining better results. But, fast and effective searching for relevant images from a database becomes a challenging task. In the previous existing system, the CBIR has used the… More >

  • Open Access

    ARTICLE

    Underwater Terrain Image Stitching Based on Spatial Gradient Feature Block

    Zhenzhou Wang1, Jiashuo Li1, Xiang Wang1,*, Xuanhao Niu2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4157-4171, 2022, DOI:10.32604/cmc.2022.027017 - 29 March 2022

    Abstract At present, underwater terrain images are all strip-shaped small fragment images preprocessed by the side-scan sonar imaging system. However, the processed underwater terrain images have inconspicuous and few feature points. In order to better realize the stitching of underwater terrain images and solve the problems of slow traditional image stitching speed, we proposed an improved algorithm for underwater terrain image stitching based on spatial gradient feature block. First, the spatial gradient fuzzy C-Means algorithm is used to divide the underwater terrain image into feature blocks with the fusion of spatial gradient information. The accelerated-KAZE (A-KAZE)… More >

  • Open Access

    ARTICLE

    DAMFO-Based Optimal Path Selection and Data Aggregation in WSN

    S. Sudha Mercy1,*, J. M. Mathana2, J. S. Leena Jasmine3

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 589-604, 2022, DOI:10.32604/iasc.2022.021068 - 26 October 2021

    Abstract Wireless Sensor Network (WSN) encompasses several tiny devices termed as Sensor Nodes (SN) that have restriction in resources with lower energy, memory, together with computation. Data Aggregation (DA) is required to optimize WSN for secured data transmission at Cluster Head (CH) together with Base Station (BS). With regard to the Energy Efficiency (EE) along with the privacy conservation requirements of WSN in big-data processing and aggregation, this paper proposed Diversity centered Adaptive Moth-Flame Optimization (DAMFO) for Optimal Path Selection (OPS) and DA in WSN. In the proposed work, initially, the Trust Evaluation (TE) process is… More >

  • Open Access

    ARTICLE

    Unknown Attack Detection: Combining Relabeling and Hybrid Intrusion Detection

    Gun-Yoon Shin1, Dong-Wook Kim1, Sang-Soo Kim2, Myung-Mook Han3,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3289-3303, 2021, DOI:10.32604/cmc.2021.017502 - 06 May 2021

    Abstract Detection of unknown attacks like a zero-day attack is a research field that has long been studied. Recently, advances in Machine Learning (ML) and Artificial Intelligence (AI) have led to the emergence of many kinds of attack-generation tools developed using these technologies to evade detection skillfully. Anomaly detection and misuse detection are the most commonly used techniques for detecting intrusion by unknown attacks. Although anomaly detection is adequate for detecting unknown attacks, its disadvantage is the possibility of high false alarms. Misuse detection has low false alarms; its limitation is that it can detect only… More >

  • Open Access

    ARTICLE

    Determination of Cup to Disc Ratio Using Unsupervised Machine Learning Techniques for Glaucoma Detection

    R. Praveena*, T. R. GaneshBabu

    Molecular & Cellular Biomechanics, Vol.18, No.2, pp. 69-86, 2021, DOI:10.32604/mcb.2021.014622 - 09 April 2021

    Abstract The cup nerve head, optic cup, optic disc ratio and neural rim configuration are observed as important for detecting glaucoma at an early stage in clinical practice. The main clinical indicator of glaucoma optic cup to disc ratio is currently determined manually by limiting the mass screening was potential. This paper proposes the following methods for an automatic cup to disc ratio determination. In the first part of the work, fundus image of the optic disc region is considered. Clustering means K is used automatically to extract the optic disc whereas K-value is automatically selected… More >

Displaying 11-20 on page 2 of 24. Per Page