Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (141)
  • Open Access

    ARTICLE

    DTLM-DBP: Deep Transfer Learning Models for DNA Binding Proteins Identification

    Sara Saber1, Uswah Khairuddin2,*, Rubiyah Yusof2, Ahmed Madani1

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3563-3576, 2021, DOI:10.32604/cmc.2021.017769 - 06 May 2021

    Abstract The identification of DNA binding proteins (DNABPs) is considered a major challenge in genome annotation because they are linked to several important applied and research applications of cellular functions e.g., in the study of the biological, biophysical, and biochemical effects of antibiotics, drugs, and steroids on DNA. This paper presents an efficient approach for DNABPs identification based on deep transfer learning, named “DTLM-DBP.” Two transfer learning methods are used in the identification process. The first is based on the pre-trained deep learning model as a feature’s extractor and classifier. Two different pre-trained Convolutional Neural Networks… More >

  • Open Access

    ARTICLE

    Enhanced Deep Autoencoder Based Feature Representation Learning for Intelligent Intrusion Detection System

    Thavavel Vaiyapuri*, Adel Binbusayyis

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3271-3288, 2021, DOI:10.32604/cmc.2021.017665 - 06 May 2021

    Abstract In the era of Big data, learning discriminant feature representation from network traffic is identified has as an invariably essential task for improving the detection ability of an intrusion detection system (IDS). Owing to the lack of accurately labeled network traffic data, many unsupervised feature representation learning models have been proposed with state-of-the-art performance. Yet, these models fail to consider the classification error while learning the feature representation. Intuitively, the learnt feature representation may degrade the performance of the classification task. For the first time in the field of intrusion detection, this paper proposes an… More >

  • Open Access

    ARTICLE

    Research on Feature Extraction Method of Social Network Text

    Zheng Zhang*, Shu Zhou

    Journal of New Media, Vol.3, No.2, pp. 73-80, 2021, DOI:10.32604/jnm.2021.018923 - 23 April 2021

    Abstract The development of various applications based on social network text is in full swing. Studying text features and classifications is of great value to extract important information. This paper mainly introduces the common feature selection algorithms and feature representation methods, and introduces the basic principles, advantages and disadvantages of SVM and KNN, and the evaluation indexes of classification algorithms. In the aspect of mutual information feature selection function, it describes its processing flow, shortcomings and optimization improvements. In view of its weakness in not balancing the positive and negative correlation characteristics, a balance weight attribute More >

  • Open Access

    ARTICLE

    Identification of Abnormal Patterns in AR (1) Process Using CS-SVM

    Hongshuo Zhang1, Bo Zhu1,*, Kaimin Pang1, Chunmei Chen1, Yuwei Wan2

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 797-810, 2021, DOI:10.32604/iasc.2021.017232 - 20 April 2021

    Abstract Using machine learning method to recognize abnormal patterns covers the shortage of traditional control charts for autocorrelation processes, which violate the applicable conditions of the control chart, i.e., the independent identically distributed (IID) assumption. In this study, we propose a recognition model based on support vector machine (SVM) for the AR (1) type of autocorrelation process. For achieving a higher recognition performance, the cuckoo search algorithm (CS) is used to optimize the two hyper-parameters of SVM, namely the penalty parameter c and the radial basis kernel parameter g. By using Monte Carlo simulation methods, the data… More >

  • Open Access

    ARTICLE

    An Anomaly Detection Method of Industrial Data Based on Stacking Integration

    Kunkun Wang1,2, Xianda Liu2,3,4,*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 9-19, 2021, DOI:10.32604/jai.2021.016706 - 02 April 2021

    Abstract With the development of Internet technology, the computing power of data has increased, and the development of machine learning has become faster and faster. In the industrial production of industrial control systems, quality inspection and safety production of process products have always been our concern. Aiming at the low accuracy of anomaly detection in process data in industrial control system, this paper proposes an anomaly detection method based on stacking integration using the machine learning algorithm. Data are collected from the industrial site and processed by feature engineering. Principal component analysis (PCA) and integrated rule… More >

  • Open Access

    ARTICLE

    Prediction Model for Gas Outburst Intensity of Coal Mining Face Based on Improved PSO and LSSVM

    Haibo Liu1,*, Yujie Dong2, Fuzhong Wang1

    Energy Engineering, Vol.118, No.3, pp. 679-689, 2021, DOI:10.32604/EE.2021.014630 - 22 March 2021

    Abstract For the problems of nonlinearity, uncertainty and low prediction accuracy in the gas outburst prediction of coal mining face, the least squares support vector machine (LSSVM) is proposed to establish the prediction model. Firstly, considering the inertia coefficients as global parameters lacks the ability to improve the solution for the traditional particle swarm optimization (PSO), an improved PSO (IPSO) algorithm is introduced to adjust different inertia weights in updating the particle swarm and solve the fitness to stagnate. Secondly, the penalty factor and kernel function parameter of LSSVM are searched automatically, and the regression accuracy More >

  • Open Access

    ARTICLE

    A Hybrid Model Using Bio-Inspired Metaheuristic Algorithms for Network Intrusion Detection System

    Omar Almomani*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 409-429, 2021, DOI:10.32604/cmc.2021.016113 - 22 March 2021

    Abstract Network Intrusion Detection System (IDS) aims to maintain computer network security by detecting several forms of attacks and unauthorized uses of applications which often can not be detected by firewalls. The features selection approach plays an important role in constructing effective network IDS. Various bio-inspired metaheuristic algorithms used to reduce features to classify network traffic as abnormal or normal traffic within a shorter duration and showing more accuracy. Therefore, this paper aims to propose a hybrid model for network IDS based on hybridization bio-inspired metaheuristic algorithms to detect the generic attack. The proposed model has… More >

  • Open Access

    ARTICLE

    Ensemble Machine Learning Based Identification of Pediatric Epilepsy

    Shamsah Majed Alotaibi1, Atta-ur-Rahman1, Mohammed Imran Basheer1, Muhammad Adnan Khan2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 149-165, 2021, DOI:10.32604/cmc.2021.015976 - 22 March 2021

    Abstract Epilepsy is a type of brain disorder that causes recurrent seizures. It is the second most common neurological disease after Alzheimer’s. The effects of epilepsy in children are serious, since it causes a slower growth rate and a failure to develop certain skills. In the medical field, specialists record brain activity using an Electroencephalogram (EEG) to observe the epileptic seizures. The detection of these seizures is performed by specialists, but the results might not be accurate due to human errors; therefore, automated detection of epileptic pediatric seizures might be the optimal solution. This paper investigates… More >

  • Open Access

    ARTICLE

    Machine Learning in Detecting Schizophrenia: An Overview

    Gurparsad Singh Suri1, Gurleen Kaur1, Sara Moein2,*

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 723-735, 2021, DOI:10.32604/iasc.2021.015049 - 01 March 2021

    Abstract Schizophrenia (SZ) is a mental heterogeneous psychiatric disorder with unknown cause. Neuroscientists postulate that it is related to brain networks. Recently, scientists applied machine learning (ML) and artificial intelligence for the detection, monitoring, and prognosis of a range of diseases, including SZ, because these techniques show a high performance in discovering an association between disease symptoms and disease. Regions of the brain have significant connections to the symptoms of SZ. ML has the power to detect these associations. ML interests researchers because of its ability to reduce the number of input features when the data More >

  • Open Access

    ARTICLE

    A Combined Approach of Principal Component Analysis and Support Vector Machine for Early Development Phase Modeling of Ohrid Trout (Salmo Letnica)

    Sunil Kr. Jha1,*, Ivan Uzunov2, Xiaorui Zhang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 991-1009, 2021, DOI:10.32604/cmes.2021.011821 - 19 February 2021

    Abstract Ohrid trout (Salamo letnica) is an endemic species of fish found in Lake Ohrid in the Former Yugoslav Republic of Macedonia (FYROM). The growth of Ohrid trout was examined in a controlled environment for a certain period, thereafter released into the lake to grow their natural population. The external features of the fish were measured regularly during the cultivation period in the laboratory to monitor their growth. The data mining methods-based computational model can be used for fast, accurate, reliable, automatic, and improved growth monitoring procedures and classification of Ohrid trout. With this motivation, a combined… More >

Displaying 101-110 on page 11 of 141. Per Page