Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (686)
  • Open Access

    ARTICLE

    Numerical Simulation-Based Analysis of the Impact of Overloading on Segmentally Assembled Bridges

    Donghui Ma1, Wenqi Wu2, Yuan Li1, Lun Zhao1, Yingchun Cai2,*, Pan Guo2,*, Shaolin Yang2

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 663-681, 2024, DOI:10.32604/sdhm.2024.052677

    Abstract Segmentally assembled bridges are increasingly finding engineering applications in recent years due to their unique advantages, especially as urban viaducts. Vehicle loads are one of the most important variable loads acting on bridge structures. Accordingly, the influence of overloaded vehicles on existing assembled bridge structures is an urgent concern at present. This paper establishes the finite element model of the segmentally assembled bridge based on ABAQUS software and analyzes the influence of vehicle overload on an assembled girder bridge structure. First, a finite element model corresponding to the target bridge is established based on ABAQUS… More >

  • Open Access

    ARTICLE

    Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias

    Batyrkhan Omarov1,2,*, Meirzhan Baikuvekov1, Daniyar Sultan1, Nurzhan Mukazhanov3, Madina Suleimenova2, Maigul Zhekambayeva3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 341-359, 2024, DOI:10.32604/cmc.2024.052437

    Abstract This research introduces an innovative ensemble approach, combining Deep Residual Networks (ResNets) and Bidirectional Gated Recurrent Units (BiGRU), augmented with an Attention Mechanism, for the classification of heart arrhythmias. The escalating prevalence of cardiovascular diseases necessitates advanced diagnostic tools to enhance accuracy and efficiency. The model leverages the deep hierarchical feature extraction capabilities of ResNets, which are adept at identifying intricate patterns within electrocardiogram (ECG) data, while BiGRU layers capture the temporal dynamics essential for understanding the sequential nature of ECG signals. The integration of an Attention Mechanism refines the model’s focus on critical segments… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1325-1345, 2024, DOI:10.32604/cmc.2024.051778

    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

  • Open Access

    ARTICLE

    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562

    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access

    ARTICLE

    Learning Dual-Layer User Representation for Enhanced Item Recommendation

    Fuxi Zhu1, Jin Xie2,*, Mohammed Alshahrani3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 949-971, 2024, DOI:10.32604/cmc.2024.051046

    Abstract User representation learning is crucial for capturing different user preferences, but it is also critical challenging because user intentions are latent and dispersed in complex and different patterns of user-generated data, and thus cannot be measured directly. Text-based data models can learn user representations by mining latent semantics, which is beneficial to enhancing the semantic function of user representations. However, these technologies only extract common features in historical records and cannot represent changes in user intentions. However, sequential feature can express the user’s interests and intentions that change time by time. But the sequential recommendation… More >

  • Open Access

    ARTICLE

    Orbit Weighting Scheme in the Context of Vector Space Information Retrieval

    Ahmad Ababneh1, Yousef Sanjalawe2, Salam Fraihat3,*, Salam Al-E’mari4, Hamzah Alqudah5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1347-1379, 2024, DOI:10.32604/cmc.2024.050600

    Abstract This study introduces the Orbit Weighting Scheme (OWS), a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval (IR) models, which have traditionally relied on weighting schemes like tf-idf and BM25. These conventional methods often struggle with accurately capturing document relevance, leading to inefficiencies in both retrieval performance and index size management. OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space, emphasizing term relationships and distribution patterns overlooked by existing models. Our research focuses on evaluating OWS’s impact… More >

  • Open Access

    ARTICLE

    5G Resource Allocation Using Feature Selection and Greylag Goose Optimization Algorithm

    Amel Ali Alhussan1, S. K. Towfek2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1179-1201, 2024, DOI:10.32604/cmc.2024.049874

    Abstract In the contemporary world of highly efficient technological development, fifth-generation technology (5G) is seen as a vital step forward with theoretical maximum download speeds of up to twenty gigabits per second (Gbps). As far as the current implementations are concerned, they are at the level of slightly below 1 Gbps, but this allowed a great leap forward from fourth generation technology (4G), as well as enabling significantly reduced latency, making 5G an absolute necessity for applications such as gaming, virtual conferencing, and other interactive electronic processes. Prospects of this change are not limited to connectivity… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach to Cyberbullying Detection in Arabic Tweets

    Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1033-1054, 2024, DOI:10.32604/cmc.2024.048003

    Abstract With the rapid growth of internet usage, a new situation has been created that enables practicing bullying. Cyberbullying has increased over the past decade, and it has the same adverse effects as face-to-face bullying, like anger, sadness, anxiety, and fear. With the anonymity people get on the internet, they tend to be more aggressive and express their emotions freely without considering the effects, which can be a reason for the increase in cyberbullying and it is the main motive behind the current study. This study presents a thorough background of cyberbullying and the techniques used… More >

  • Open Access

    ARTICLE

    Suitability Evaluation for Urban Green Space Areas in Sèmè-Podji District (Southern Benin), Using GIS and AHP Methods

    Abdel Aziz Osséni1, Gbodja Houéhanou François Gbesso1,*, Sedami Igor Armand Yevide2, Etienne Romaric Adéwalé Godonou1

    Revue Internationale de Géomatique, Vol.33, pp. 201-220, 2024, DOI:10.32604/rig.2024.053500

    Abstract Urban green areas play a vital role in enhancing the social balance, resilience, and environmental sustainability of urban settings. In Benin, while the landscaping sector is expanding, finding appropriate locations for creating green spaces remains a challenge. The purpose of this study was to identify areas conducive to the incorporation of green landscapes into urban planning within the Sèmè-Podji District. The approach used involved a multi-criteria analysis leveraging a combined GIS and Analytic Hierarchy Process (AHP) framework. Six key factors were considered: land use, elevation, slope, distance to major roads, proximity to urban hubs, and… More > Graphic Abstract

    Suitability Evaluation for Urban Green Space Areas in Sèmè-Podji District (Southern Benin), Using GIS and AHP Methods

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

Displaying 1-10 on page 1 of 686. Per Page