Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Computational Intelligent Systems for Solving Complex Engineering Problems: Principles and Applications

    Danial Jahed Armaghani1,*, Ahmed Salih Mohammed2,3, Ramesh Murlidhar Bhatawdekar4, Pouyan Fakharian5, Ashutosh Kainthola6, Wael Imad Mahmood7

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2023-2027, 2024, DOI:10.32604/cmes.2023.031701

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Comparative Analysis of COVID-19 Detection Methods Based on Neural Network

    Inès Hilali-Jaghdam1,*, Azhari A Elhag2, Anis Ben Ishak3, Bushra M. Elamin Elnaim4, Omer Eltag Mohammed Elhag5, Feda Muhammed Abuhaimed1, S. Abdel-Khalek2,6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1127-1150, 2023, DOI:10.32604/cmc.2023.038915

    Abstract In 2019, the novel coronavirus disease 2019 (COVID-19) ravaged the world. As of July 2021, there are about 192 million infected people worldwide and 4.1365 million deaths. At present, the new coronavirus is still spreading and circulating in many places around the world, especially since the emergence of Delta variant strains has increased the risk of the COVID-19 pandemic again. The symptoms of COVID-19 are diverse, and most patients have mild symptoms, with fever, dry cough, and fatigue as the main manifestations, and about 15.7% to 32.0% of patients will develop severe symptoms. Patients are screened in hospitals or primary… More >

  • Open Access

    ARTICLE

    Traffic Sign Detection with Low Complexity for Intelligent Vehicles Based on Hybrid Features

    Sara Khalid1, Jamal Hussain Shah1,*, Muhammad Sharif1, Muhammad Rafiq2, Gyu Sang Choi3,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 861-879, 2023, DOI:10.32604/cmc.2023.035595

    Abstract Globally traffic signs are used by all countries for healthier traffic flow and to protect drivers and pedestrians. Consequently, traffic signs have been of great importance for every civilized country, which makes researchers give more focus on the automatic detection of traffic signs. Detecting these traffic signs is challenging due to being in the dark, far away, partially occluded, and affected by the lighting or the presence of similar objects. An innovative traffic sign detection method for red and blue signs in color images is proposed to resolve these issues. This technique aimed to devise an efficient, robust and accurate… More >

  • Open Access

    ARTICLE

    Improved Network Validity Using Various Soft Computing Techniques

    M. Yuvaraju*, R. Elakkiyavendan

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1465-1477, 2023, DOI:10.32604/iasc.2023.032417

    Abstract Nowadays, when a life span of sensor nodes are threatened by the shortage of energy available for communication, sink mobility is an excellent technique for increasing its lifespan. When communicating via a WSN, the use of nodes as a transmission method eliminates the need for a physical medium. Sink mobility in a dynamic network topology presents a problem for sensor nodes that have reserved resources. Unless the route is revised and changed to reflect the location of the mobile sink location, it will be inefficient for delivering data effectively. In the clustering strategy, nodes are grouped together to improve communication,… More >

  • Open Access

    ARTICLE

    Intelligent Systems and Photovoltaic Cells Empowered Topologically by Sudoku Networks

    Khalid Hamid1, Muhammad Waseem Iqbal2, M. Usman Ashraf3, Akber Abid Gardezi4, Shafiq Ahmad5, Mejdal Alqahtani5, Muhammad Shafiq6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4221-4238, 2023, DOI:10.32604/cmc.2023.034320

    Abstract A graph invariant is a number that can be easily and uniquely calculated through a graph. Recently, part of mathematical graph invariants has been portrayed and utilized for relationship examination. Nevertheless, no reliable appraisal has been embraced to pick, how much these invariants are associated with a network graph in interconnection networks of various fields of computer science, physics, and chemistry. In this paper, the study talks about sudoku networks will be networks of fractal nature having some applications in computer science like sudoku puzzle game, intelligent systems, Local area network (LAN) development and parallel processors interconnections, music composition creation,… More >

  • Open Access

    ARTICLE

    Intelligent Firefly Algorithm Deep Transfer Learning Based COVID-19 Monitoring System

    Mahmoud Ragab1,2,3,*, Mohammed W. Al-Rabia4,5, Sami Saeed Binyamin6, Ahmed A. Aldarmahi7,8

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2889-2903, 2023, DOI:10.32604/cmc.2023.032192

    Abstract With the increasing and rapid growth rate of COVID-19 cases, the healthcare scheme of several developed countries have reached the point of collapse. An important and critical steps in fighting against COVID-19 is powerful screening of diseased patients, in such a way that positive patient can be treated and isolated. A chest radiology image-based diagnosis scheme might have several benefits over traditional approach. The accomplishment of artificial intelligence (AI) based techniques in automated diagnoses in the healthcare sector and rapid increase in COVID-19 cases have demanded the requirement of AI based automated diagnosis and recognition systems. This study develops an… More >

  • Open Access

    ARTICLE

    Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF)

    Neetika Bhandari1,*, Payal Pahwa2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2043-2055, 2023, DOI:10.32604/iasc.2023.028368

    Abstract Data is humongous today because of the extensive use of World Wide Web, Social Media and Intelligent Systems. This data can be very important and useful if it is harnessed carefully and correctly. Useful information can be extracted from this massive data using the Data Mining process. The information extracted can be used to make vital decisions in various industries. Clustering is a very popular Data Mining method which divides the data points into different groups such that all similar data points form a part of the same group. Clustering methods are of various types. Many parameters and indexes exist… More >

  • Open Access

    ARTICLE

    Arabic Sentiment Analysis of Users’ Opinions of Governmental Mobile Applications

    Mohammed Hadwan1,2,3,*, Mohammed A. Al-Hagery4, Mohammed Al-Sarem5, Faisal Saeed5,6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4675-4689, 2022, DOI:10.32604/cmc.2022.027311

    Abstract Different types of pandemics that have appeared from time to time have changed many aspects of daily life. Some governments encourage their citizens to use certain applications to help control the spread of disease and to deliver other services during lockdown. The Saudi government has launched several mobile apps to control the pandemic and have made these apps available through Google Play and the app store. A huge number of reviews are written daily by users to express their opinions, which include significant information to improve these applications. The manual processing and extracting of information from users’ reviews is an… More >

  • Open Access

    ARTICLE

    Smart Deep Learning Based Human Behaviour Classification for Video Surveillance

    Esam A. AlQaralleh1, Fahad Aldhaban2, Halah Nasseif2, Malek Z. Alksasbeh3, Bassam A. Y. Alqaralleh2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5593-5605, 2022, DOI:10.32604/cmc.2022.026666

    Abstract Real-time video surveillance system is commonly employed to aid security professionals in preventing crimes. The use of deep learning (DL) technologies has transformed real-time video surveillance into smart video surveillance systems that automate human behavior classification. The recognition of events in the surveillance videos is considered a hot research topic in the field of computer science and it is gaining significant attention. Human action recognition (HAR) is treated as a crucial issue in several applications areas and smart video surveillance to improve the security level. The advancements of the DL models help to accomplish improved recognition performance. In this view,… More >

  • Open Access

    ARTICLE

    Internal Validity Index for Fuzzy Clustering Based on Relative Uncertainty

    Refik Tanju Sirmen1,*, Burak Berk Üstündağ2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2909-2926, 2022, DOI:10.32604/cmc.2022.023947

    Abstract Unsupervised clustering and clustering validity are used as essential instruments of data analytics. Despite clustering being realized under uncertainty, validity indices do not deliver any quantitative evaluation of the uncertainties in the suggested partitionings. Also, validity measures may be biased towards the underlying clustering method. Moreover, neglecting a confidence requirement may result in over-partitioning. In the absence of an error estimate or a confidence parameter, probable clustering errors are forwarded to the later stages of the system. Whereas, having an uncertainty margin of the projected labeling can be very fruitful for many applications such as machine learning. Herein, the validity… More >

Displaying 1-10 on page 1 of 19. Per Page