Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    FSFS: A Novel Statistical Approach for Fair and Trustworthy Impactful Feature Selection in Artificial Intelligence Models

    Ali Hamid Farea1,*, Iman Askerzade1,2, Omar H. Alhazmi3, Savaş Takan4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1457-1484, 2025, DOI:10.32604/cmc.2025.064872 - 09 June 2025

    Abstract Feature selection (FS) is a pivotal pre-processing step in developing data-driven models, influencing reliability, performance and optimization. Although existing FS techniques can yield high-performance metrics for certain models, they do not invariably guarantee the extraction of the most critical or impactful features. Prior literature underscores the significance of equitable FS practices and has proposed diverse methodologies for the identification of appropriate features. However, the challenge of discerning the most relevant and influential features persists, particularly in the context of the exponential growth and heterogeneity of big data—a challenge that is increasingly salient in modern artificial… More >

  • Open Access

    ARTICLE

    Efficient Method for Trademark Image Retrieval: Leveraging Siamese and Triplet Networks with Examination-Informed Loss Adjustment

    Thanh Bui-Minh1, Nguyen Long Giang1, Luan Thanh Le2,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1203-1226, 2025, DOI:10.32604/cmc.2025.064403 - 09 June 2025

    Abstract Image-based similar trademark retrieval is a time-consuming and labor-intensive task in the trademark examination process. This paper aims to support trademark examiners by training Deep Convolutional Neural Network (DCNN) models for effective Trademark Image Retrieval (TIR). To achieve this goal, we first develop a novel labeling method that automatically generates hundreds of thousands of labeled similar and dissimilar trademark image pairs using accompanying data fields such as citation lists, Vienna classification (VC) codes, and trademark ownership information. This approach eliminates the need for manual labeling and provides a large-scale dataset suitable for training deep learning… More >

  • Open Access

    ARTICLE

    Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain

    Hongliang Tian, Zhong Fan*, Zhiyang Ruan, Aomen Zhao

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5199-5217, 2025, DOI:10.32604/cmc.2025.063274 - 19 May 2025

    Abstract With the continuous growth of exponential data in IoT, it is usually chosen to outsource data to the cloud server. However, cloud servers are usually provided by third parties, and there is a risk of privacy leakage. Encrypting data can ensure its security, but at the same time, it loses the retrieval function of IoT data. Searchable Encryption (SE) can achieve direct retrieval based on ciphertext data. The traditional searchable encryption scheme has the problems of imperfect function, low retrieval efficiency, inaccurate retrieval results, and centralized cloud servers being vulnerable and untrustworthy. This paper proposes… More >

  • Open Access

    ARTICLE

    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598 - 20 June 2024

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

  • Open Access

    ARTICLE

    Synergizing Wind, Solar, and Biomass Power: Ranking Analysis of Off-Grid System for Different Weather Conditions of Iran

    Razieh Keshavarzi, Mehdi Jahangiri*

    Energy Engineering, Vol.121, No.6, pp. 1381-1401, 2024, DOI:10.32604/ee.2024.050029 - 21 May 2024

    Abstract Nowadays, the use of renewable energies, especially wind, solar, and biomass, is essential as an effective solution to address global environmental and economic challenges. Therefore, the current study examines the energy-economic-environmental analysis of off-grid electricity generation systems using solar panels, wind turbines, and biomass generators in various weather conditions in Iran. Simulations over 25 years were conducted using HOMER v2.81 software, aiming to determine the potential of each region and find the lowest cost of electricity production per kWh. In the end, to identify the most suitable location, the Technique for Order Preference by Similarity… More > Graphic Abstract

    Synergizing Wind, Solar, and Biomass Power: Ranking Analysis of Off-Grid System for Different Weather Conditions of Iran

  • Open Access

    ARTICLE

    Multi-Criteria Decision-Making for Power Grid Construction Project Investment Ranking Based on the Prospect Theory Improved by Rewarding Good and Punishing Bad Linear Transformation

    Shun Ma1, Na Yu1, Xiuna Wang2, Shiyan Mei1, Mingrui Zhao2,*, Xiaoyu Han2

    Energy Engineering, Vol.120, No.10, pp. 2369-2392, 2023, DOI:10.32604/ee.2023.028727 - 28 September 2023

    Abstract Using the improved prospect theory with the linear transformations of rewarding good and punishing bad (RGPBIT), a new investment ranking model for power grid construction projects (PGCPs) is proposed. Given the uncertainty of each index value under the market environment, fuzzy numbers are used to describe qualitative indicators and interval numbers are used to describe quantitative ones. Taking into account decision-maker’s subjective risk attitudes, a multi-criteria decision-making (MCDM) method based on improved prospect theory is proposed. First, the [−1, 1] RGPBIT operator is proposed to normalize the original data, to obtain the best and worst More >

  • Open Access

    ARTICLE

    Fusion of Feature Ranking Methods for an Effective Intrusion Detection System

    Seshu Bhavani Mallampati1, Seetha Hari2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1721-1744, 2023, DOI:10.32604/cmc.2023.040567 - 30 August 2023

    Abstract Expanding internet-connected services has increased cyberattacks, many of which have grave and disastrous repercussions. An Intrusion Detection System (IDS) plays an essential role in network security since it helps to protect the network from vulnerabilities and attacks. Although extensive research was reported in IDS, detecting novel intrusions with optimal features and reducing false alarm rates are still challenging. Therefore, we developed a novel fusion-based feature importance method to reduce the high dimensional feature space, which helps to identify attacks accurately with less false alarm rate. Initially, to improve training data quality, various preprocessing techniques are… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Optimization Algorithm for Materialized View Selection from Data Warehouse Environments

    Popuri Srinivasarao, Aravapalli Rama Satish*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1527-1547, 2023, DOI:10.32604/csse.2023.038951 - 28 July 2023

    Abstract Responding to complex analytical queries in the data warehouse (DW) is one of the most challenging tasks that require prompt attention. The problem of materialized view (MV) selection relies on selecting the most optimal views that can respond to more queries simultaneously. This work introduces a combined approach in which the constraint handling process is combined with metaheuristics to select the most optimal subset of DW views from DWs. The proposed work initially refines the solution to enable a feasible selection of views using the ensemble constraint handling technique (ECHT). The constraints such as self-adaptive… More >

  • Open Access

    ARTICLE

    Modified Computational Ranking Model for Cloud Trust Factor Using Fuzzy Logic

    Lei Shen*, Ting Huang, Nishui Cai, Hao Wu

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 507-524, 2023, DOI:10.32604/iasc.2023.037640 - 29 April 2023

    Abstract Through the use of the internet and cloud computing, users may access their data as well as the programmes they have installed. It is now more challenging than ever before to choose which cloud service providers to take advantage of. When it comes to the dependability of the cloud infrastructure service, those who supply cloud services, as well as those who seek cloud services, have an equal responsibility to exercise utmost care. Because of this, further caution is required to ensure that the appropriate values are reached in light of the ever-increasing need for correct… More >

  • Open Access

    ARTICLE

    Machine Learning for Hybrid Line Stability Ranking Index in Polynomial Load Modeling under Contingency Conditions

    P. Venkatesh1,*, N. Visali2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1001-1012, 2023, DOI:10.32604/iasc.2023.036268 - 29 April 2023

    Abstract In the conventional technique, in the evaluation of the severity index, clustering and loading suffer from more iteration leading to more computational delay. Hence this research article identifies, a novel progression for fast predicting the severity of the line and clustering by incorporating machine learning aspects. The polynomial load modelling or ZIP (constant impedances (Z), Constant Current (I) and Constant active power (P)) is developed in the IEEE-14 and Indian 118 bus systems considered for analysis of power system security. The process of finding the severity of the line using a Hybrid Line Stability Ranking… More >

Displaying 1-10 on page 1 of 44. Per Page