Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (966)
  • Open Access

    EDITORIAL

    Special Issue on Machine Learning and Data Mining for Cyber-Physical Systems

    Zheng Xu, Zhiguo Yan

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 517-518, 2018, DOI:10.31209/2018.100000018

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Novel Android Malware Detection Method Based on Multi-dimensional Hybrid Features Extraction and Analysis

    Yue Li1, Guangquan Xu2,3, Hequn Xian1,*, Longlong Rao3, Jiangang Shi4,*

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 637-647, 2019, DOI:10.31209/2019.100000118

    Abstract In order to prevent the spread of Android malware and protect privacy information from being compromised, this study proposes a novel multidimensional hybrid features extraction and analysis method for Android malware detection. This method is based primarily on a multidimensional hybrid features vector by extracting the information of permission requests, API calls, and runtime behaviors. The innovation of this study is to extract greater amounts of static and dynamic features information and combine them, that renders the features vector for training completer and more comprehensive. In addition, the feature selection algorithm is used to further optimize the extracted information to… More >

  • Open Access

    ARTICLE

    Study of Shearing Line Traces Laser Detection System

    Nan Pan1*, Dilin Pan2, Yi Liu2, Gang Li3

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 367-373, 2019, DOI:10.31209/2019.100000098

    Abstract A set of laser detection system for shearing tools is developed, By holding breakage of the cable, firstly, using single-point laser displacement sensors to pick up surface features signal of line trace, then wavelet decomposition is used to reduce the noise, and the signal after noise reduction is obtained. After that, the threshold based sequence comparison method is used to achieve matches of similar coincidence for trace features, and then using a gradient descent method to getting the minimum cost of cost function value through continuous iterative, and finally realizing the fast traceability of corresponding shearing tool. More >

  • Open Access

    ARTICLE

    Line Trace Effective Comparison Algorithm Based on Wavelet Domain DTW

    Nan Pan1, Yi Liu2, Dilin Pan2, Junbing Qian1, Gang Li3

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 359-366, 2019, DOI:10.31209/2019.100000097

    Abstract It will face a lot of problems when using existing image-processing and 3D scanning methods to do the similarity analysis of the line traces, therefore, an effective comparison algorithm is put forward for the purpose of making effective trace analysis and infer the criminal tools. The proposed algorithm applies wavelet decomposition to the line trace 1-D detection signals to partially reduce background noises. After that, the sequence comparison strategy based on wavelet domain DTW is employed to do trace feature similarity matching. Finally, using linear regression machine learning algorithm based on gradient descent method to do constant iteration. The experiment… More >

  • Open Access

    ARTICLE

    Surgical Outcome Prediction in Total Knee Arthroplasty Using Machine Learning

    Belayat Hossaina, Takatoshi Morookab, Makiko Okunob, Manabu Niia, Shinichi Yoshiyab, Syoji Kobashia

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 105-115, 2019, DOI:10.31209/2018.100000034

    Abstract This work aimed to predict postoperative knee functions of a new patient prior to total knee arthroplasty (TKA) surgery using machine learning, because such prediction is essential for surgical planning and for patients to better understand the TKA outcome. However, the main difficulty is to determine the relationships among individual varieties of preoperative and postoperative knee kinematics. The problem was solved by constructing predictive models from the knee kinematics data of 35 osteoarthritis patients, operated by posterior stabilized implant, based on generalized linear regression (GLR) analysis. Two prediction methods (without and with principal component analysis followed by GLR) along with… More >

  • Open Access

    ARTICLE

    Quantum Generative Model with Variable-Depth Circuit

    Yiming Huang1, *, Hang Lei1, Xiaoyu Li1, *, Qingsheng Zhu2, Wanghao Ren3, Xusheng Liu2, 4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 445-458, 2020, DOI:10.32604/cmc.2020.010390

    Abstract In recent years, an increasing number of studies about quantum machine learning not only provide powerful tools for quantum chemistry and quantum physics but also improve the classical learning algorithm. The hybrid quantum-classical framework, which is constructed by a variational quantum circuit (VQC) and an optimizer, plays a key role in the latest quantum machine learning studies. Nevertheless, in these hybridframework-based quantum machine learning models, the VQC is mainly constructed with a fixed structure and this structure causes inflexibility problems. There are also few studies focused on comparing the performance of quantum generative models with different loss functions. In this… More >

  • Open Access

    ARTICLE

    Applying Stack Bidirectional LSTM Model to Intrusion Detection

    Ziyong Ran1, Desheng Zheng1, *, Yanling Lai1, Lulu Tian2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 309-320, 2020, DOI:10.32604/cmc.2020.010102

    Abstract Nowadays, Internet has become an indispensable part of daily life and is used in many fields. Due to the large amount of Internet traffic, computers are subject to various security threats, which may cause serious economic losses and even endanger national security. It is hoped that an effective security method can systematically classify intrusion data in order to avoid leakage of important data or misuse of data. As machine learning technology matures, deep learning is widely used in various industries. Combining deep learning with network security and intrusion detection is the current trend. In this paper, the problem of data… More >

  • Open Access

    ARTICLE

    Network-Aided Intelligent Traffic Steering in 5G Mobile Networks

    Dae-Young Kim1, Seokhoon Kim2, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 243-261, 2020, DOI:10.32604/cmc.2020.011253

    Abstract Recently, the fifth generation (5G) of mobile networks has been deployed and various ranges of mobile services have been provided. The 5G mobile network supports improved mobile broadband, ultra-low latency and densely deployed massive devices. It allows multiple radio access technologies and interworks them for services. 5G mobile systems employ traffic steering techniques to efficiently use multiple radio access technologies. However, conventional traffic steering techniques do not consider dynamic network conditions efficiently. In this paper, we propose a network aided traffic steering technique in 5G mobile network architecture. 5G mobile systems monitor network conditions and learn with network data. Through… More >

  • Open Access

    ARTICLE

    Intelligent Cloud Based Heart Disease Prediction System Empowered with Supervised Machine Learning

    Muhammad Adnan Khan1, *, Sagheer Abbas2, Ayesha Atta2, 3, Allah Ditta4, Hani Alquhayz5, Muhammad Farhan Khan6, Atta-ur-Rahman7, Rizwan Ali Naqvi8

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 139-151, 2020, DOI:10.32604/cmc.2020.011416

    Abstract The innovation in technologies related to health facilities today is increasingly helping to manage patients with different diseases. The most fatal of these is the issue of heart disease that cannot be detected from a naked eye, and attacks as soon as the human exceeds the allowed range of vital signs like pulse rate, body temperature, and blood pressure. The real challenge is to diagnose patients with more diagnostic accuracy and in a timely manner, followed by prescribing appropriate treatments and keeping prescription errors to a minimum. In developing countries, the domain of healthcare is progressing day by day using… More >

  • Open Access

    ARTICLE

    Applying Feature-Weighted Gradient Decent K-Nearest Neighbor to Select Promising Projects for Scientific Funding

    Chuqing Zhang1, Jiangyuan Yao2, *, Guangwu Hu3, Thomas Schøtt4

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1741-1753, 2020, DOI:10.32604/cmc.2020.010306

    Abstract Due to its outstanding ability in processing large quantity and high-dimensional data, machine learning models have been used in many cases, such as pattern recognition, classification, spam filtering, data mining and forecasting. As an outstanding machine learning algorithm, K-Nearest Neighbor (KNN) has been widely used in different situations, yet in selecting qualified applicants for winning a funding is almost new. The major problem lies in how to accurately determine the importance of attributes. In this paper, we propose a Feature-weighted Gradient Decent K-Nearest Neighbor (FGDKNN) method to classify funding applicants in to two types: approved ones or not approved ones.… More >

Displaying 911-920 on page 92 of 966. Per Page