Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (401)
  • Open Access

    REVIEW

    AI-Based UAV Swarms for Monitoring and Disease Identification of Brassica Plants Using Machine Learning: A Review

    Zain Anwar Ali1,2,*, Dingnan Deng1, Muhammad Kashif Shaikh3, Raza Hasan4, Muhammad Aamir Khan2

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 1-34, 2024, DOI:10.32604/csse.2023.041866

    Abstract Technological advances in unmanned aerial vehicles (UAVs) pursued by artificial intelligence (AI) are improving remote sensing applications in smart agriculture. These are valuable tools for monitoring and disease identification of plants as they can collect data with no damage and effects on plants. However, their limited carrying and battery capacities restrict their performance in larger areas. Therefore, using multiple UAVs, especially in the form of a swarm is more significant for monitoring larger areas such as crop fields and forests. The diversity of research studies necessitates a literature review for more progress and contribution in the agricultural field. In this… More >

  • Open Access

    ARTICLE

    Efficient DP-FL: Efficient Differential Privacy Federated Learning Based on Early Stopping Mechanism

    Sanxiu Jiao1, Lecai Cai2,*, Jintao Meng3, Yue Zhao3, Kui Cheng2

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 247-265, 2024, DOI:10.32604/csse.2023.040194

    Abstract Federated learning is a distributed machine learning framework that solves data security and data island problems faced by artificial intelligence. However, federated learning frameworks are not always secure, and attackers can attack customer privacy information by analyzing parameters in the training process of federated learning models. To solve the problems of data security and availability during federated learning training, this paper proposes an Efficient Differential Privacy Federated Learning Algorithm based on early stopping mechanism (Efficient DP-FL). This method inherits the advantages of differential privacy and federated learning and improves the performance of model training while protecting the parameter information uploaded… More >

  • Open Access

    ARTICLE

    Integration of Digital Twins and Artificial Intelligence for Classifying Cardiac Ischemia

    Mohamed Ammar1,*, Hamed Al-Raweshidy2,*

    Journal on Artificial Intelligence, Vol.5, pp. 195-218, 2023, DOI:10.32604/jai.2023.045199

    Abstract Despite advances in intelligent medical care, difficulties remain. Due to its complicated governance, designing, planning, improving, and managing the cardiac system remains difficult. Oversight, including intelligent monitoring, feedback systems, and management practises, is unsuccessful. Current platforms cannot deliver lifelong personal health management services. Insufficient accuracy in patient crisis warning programmes. No frequent, direct interaction between healthcare workers and patients is visible. Physical medical systems and intelligent information systems are not integrated. This study introduces the Advanced Cardiac Twin (ACT) model integrated with Artificial Neural Network (ANN) to handle real-time monitoring, decision-making, and crisis prediction. THINGSPEAK is used to create an… More >

  • Open Access

    ARTICLE

    Enhancing Breast Cancer Diagnosis with Channel-Wise Attention Mechanisms in Deep Learning

    Muhammad Mumtaz Ali, Faiqa Maqsood, Shiqi Liu, Weiyan Hou, Liying Zhang, Zhenfei Wang*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2699-2714, 2023, DOI:10.32604/cmc.2023.045310

    Abstract Breast cancer, particularly Invasive Ductal Carcinoma (IDC), is a primary global health concern predominantly affecting women. Early and precise diagnosis is crucial for effective treatment planning. Several AI-based techniques for IDC-level classification have been proposed in recent years. Processing speed, memory size, and accuracy can still be improved for better performance. Our study presents ECAM, an Enhanced Channel-Wise Attention Mechanism, using deep learning to analyze histopathological images of Breast Invasive Ductal Carcinoma (BIDC). The main objectives of our study are to enhance computational efficiency using a Separable CNN architecture, improve data representation through hierarchical feature aggregation, and increase accuracy and… More >

  • Open Access

    ARTICLE

    Multiclass Classification for Cyber Threats Detection on Twitter

    Adnan Hussein1, Abdulwahab Ali Almazroi2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3853-3866, 2023, DOI:10.32604/cmc.2023.040856

    Abstract The advances in technology increase the number of internet systems usage. As a result, cybersecurity issues have become more common. Cyber threats are one of the main problems in the area of cybersecurity. However, detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its importance. This study aims to analyze Twitter data to detect cyber threats using a multiclass classification approach. The data is passed through different tasks to prepare it for the analysis. Term Frequency and Inverse Document Frequency (TFIDF) features are extracted to vectorize the cleaned data… More >

  • Open Access

    ARTICLE

    Phishing Website URL’s Detection Using NLP and Machine Learning Techniques

    Dinesh Kalla1,*, Sivaraju Kuraku2

    Journal on Artificial Intelligence, Vol.5, pp. 145-162, 2023, DOI:10.32604/jai.2023.043366

    Abstract Phishing websites present a severe cybersecurity risk since they can lead to financial losses, data breaches, and user privacy violations. This study uses machine learning approaches to solve the problem of phishing website detection. Using artificial intelligence, the project aims to provide efficient techniques for locating and thwarting these dangerous websites. The study goals were attained by performing a thorough literature analysis to investigate several models and methods often used in phishing website identification. Logistic Regression, K-Nearest Neighbors, Decision Trees, Random Forests, Support Vector Classifiers, Linear Support Vector Classifiers, and Naive Bayes were all used in the inquiry. This research… More >

  • Open Access

    ARTICLE

    Design Optimization of Permanent Magnet Eddy Current Coupler Based on an Intelligence Algorithm

    Dazhi Wang*, Pengyi Pan, Bowen Niu

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1535-1555, 2023, DOI:10.32604/cmc.2023.042286

    Abstract The permanent magnet eddy current coupler (PMEC) solves the problem of flexible connection and speed regulation between the motor and the load and is widely used in electrical transmission systems. It provides torque to the load and generates heat and losses, reducing its energy transfer efficiency. This issue has become an obstacle for PMEC to develop toward a higher power. This paper aims to improve the overall performance of PMEC through multi-objective optimization methods. Firstly, a PMEC modeling method based on the Levenberg-Marquardt back propagation (LMBP) neural network is proposed, aiming at the characteristics of the complex input-output relationship and… More >

  • Open Access

    ARTICLE

    Assessing the Efficacy of Improved Learning in Hourly Global Irradiance Prediction

    Abdennasser Dahmani1, Yamina Ammi2, Nadjem Bailek3,4,*, Alban Kuriqi5,6, Nadhir Al-Ansari7,*, Salah Hanini2, Ilhami Colak8, Laith Abualigah9,10,11,12,13,14, El-Sayed M. El-kenawy15

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2579-2594, 2023, DOI:10.32604/cmc.2023.040625

    Abstract Increasing global energy consumption has become an urgent problem as natural energy sources such as oil, gas, and uranium are rapidly running out. Research into renewable energy sources such as solar energy is being pursued to counter this. Solar energy is one of the most promising renewable energy sources, as it has the potential to meet the world’s energy needs indefinitely. This study aims to develop and evaluate artificial intelligence (AI) models for predicting hourly global irradiation. The hyperparameters were optimized using the Broyden-Fletcher-Goldfarb-Shanno (BFGS) quasi-Newton training algorithm and STATISTICA software. Data from two stations in Algeria with different climatic… More >

  • Open Access

    ARTICLE

    Optimizing Fully Convolutional Encoder-Decoder Network for Segmentation of Diabetic Eye Disease

    Abdul Qadir Khan1, Guangmin Sun1,*, Yu Li1, Anas Bilal2, Malik Abdul Manan1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2481-2504, 2023, DOI:10.32604/cmc.2023.043239

    Abstract In the emerging field of image segmentation, Fully Convolutional Networks (FCNs) have recently become prominent. However, their effectiveness is intimately linked with the correct selection and fine-tuning of hyperparameters, which can often be a cumbersome manual task. The main aim of this study is to propose a more efficient, less labour-intensive approach to hyperparameter optimization in FCNs for segmenting fundus images. To this end, our research introduces a hyperparameter-optimized Fully Convolutional Encoder-Decoder Network (FCEDN). The optimization is handled by a novel Genetic Grey Wolf Optimization (G-GWO) algorithm. This algorithm employs the Genetic Algorithm (GA) to generate a diverse set of… More >

  • Open Access

    ARTICLE

    VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity

    Junqiang Jiang1,2, Zhifang Sun1, Xiong Jiang1, Shengjie Jin1, Yinli Jiang3, Bo Fan1,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1617-1644, 2023, DOI:10.32604/cmc.2023.041973

    Abstract The grey wolf optimizer (GWO) is a swarm-based intelligence optimization algorithm by simulating the steps of searching, encircling, and attacking prey in the process of wolf hunting. Along with its advantages of simple principle and few parameters setting, GWO bears drawbacks such as low solution accuracy and slow convergence speed. A few recent advanced GWOs are proposed to try to overcome these disadvantages. However, they are either difficult to apply to large-scale problems due to high time complexity or easily lead to early convergence. To solve the abovementioned issues, a high-accuracy variable grey wolf optimizer (VGWO) with low time complexity… More >

Displaying 21-30 on page 3 of 401. Per Page