Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (123)
  • Open Access

    ARTICLE

    Big Data Analytics with Artificial Intelligence Enabled Environmental Air Pollution Monitoring Framework

    Manar Ahmed Hamza1,*, Hadil Shaiba2, Radwa Marzouk3, Ahmad Alhindi4, Mashael M. Asiri5, Ishfaq Yaseen1, Abdelwahed Motwakel1, Mohammed Rizwanullah1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3235-3250, 2022, DOI:10.32604/cmc.2022.029604

    Abstract Environmental sustainability is the rate of renewable resource harvesting, pollution control, and non-renewable resource exhaustion. Air pollution is a significant issue confronted by the environment particularly by highly populated countries like India. Due to increased population, the number of vehicles also continues to increase. Each vehicle has its individual emission rate; however, the issue arises when the emission rate crosses the standard value and the quality of the air gets degraded. Owing to the technological advances in machine learning (ML), it is possible to develop prediction approaches to monitor and control pollution using real time data. With the development of… More >

  • Open Access

    ARTICLE

    Statistical Analysis with Dingo Optimizer Enabled Routing for Wireless Sensor Networks

    Abdulaziz S. Alghamdi1,*, Randa Alharbi2, Suliman A. Alsuhibany3, Sayed Abdel-Khalek4,5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2865-2878, 2022, DOI:10.32604/cmc.2022.028088

    Abstract Security is a vital parameter to conserve energy in wireless sensor networks (WSN). Trust management in the WSN is a crucial process as trust is utilized when collaboration is important for accomplishing trustworthy data transmission. But the available routing techniques do not involve security in the design of routing techniques. This study develops a novel statistical analysis with dingo optimizer enabled reliable routing scheme (SADO-RRS) for WSN. The proposed SADO-RRS technique aims to detect the existence of attacks and optimal routes in WSN. In addition, the presented SADO-RRS technique derives a new statistics based linear discriminant analysis (LDA) for attack… More >

  • Open Access

    ARTICLE

    Numerical Study on the Suitability of Passive Solar Heating Technology Based on Differentiated Thermal Comfort Demand

    Xiaona Fan, Qin Zhao, Guochen Sang, Yiyun Zhu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.2, pp. 627-660, 2022, DOI:10.32604/cmes.2022.020507

    Abstract Indoor thermal comfort and passive solar heating technologies have been extensively studied. However, few studies have explored the suitability of passive solar heating technologies based on differentiated thermal comfort demands. This work took the rural dwellings in Northwest China as the research object. First, the current indoor and outdoor thermal environment in winter and the mechanism of residents’ differentiated demand for indoor thermal comfort were obtained through tests, questionnaires, and statistical analysis. Second, a comprehensive passive optimized design of existing buildings was conducted, and the validity of the optimized combination scheme was explored using DesignBuilder software. Finally, the suitability of… More >

  • Open Access

    ARTICLE

    Swarming Computational Approach for the Heartbeat Van Der Pol Nonlinear System

    Muhammad Umar1, Fazli Amin1, Soheil Salahshour2, Thongchai Botmart3, Wajaree Weera3, Prem Junswang4,*, Zulqurnain Sabir1

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 6185-6202, 2022, DOI:10.32604/cmc.2022.027970

    Abstract The present study is related to design a stochastic framework for the numerical treatment of the Van der Pol heartbeat model (VP-HBM) using the feedforward artificial neural networks (ANNs) under the optimization of particle swarm optimization (PSO) hybridized with the active-set algorithm (ASA), i.e., ANNs-PSO-ASA. The global search PSO scheme and local refinement of ASA are used as an optimization procedure in this study. An error-based merit function is defined using the differential VP-HBM form as well as the initial conditions. The optimization of the merit function is accomplished using the hybrid computing performances of PSO-ASA. The designed performance of… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Enabled Statistical Analysis Model for Traffic Prediction

    Ashit Kumar Dutta1, S. Srinivasan2, S. N. Kumar3, T. S. Balaji4,5, Won Il Lee6, Gyanendra Prasad Joshi7, Sung Won Kim8,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5563-5576, 2022, DOI:10.32604/cmc.2022.027707

    Abstract Due to the advances of intelligent transportation system (ITSs), traffic forecasting has gained significant interest as robust traffic prediction acts as an important part in different ITSs namely traffic signal control, navigation, route mapping, etc. The traffic prediction model aims to predict the traffic conditions based on the past traffic data. For more accurate traffic prediction, this study proposes an optimal deep learning-enabled statistical analysis model. This study offers the design of optimal convolutional neural network with attention long short term memory (OCNN-ALSTM) model for traffic prediction. The proposed OCNN-ALSTM technique primarily pre-processes the traffic data by the use of… More >

  • Open Access

    ARTICLE

    An Advanced Stochastic Numerical Approach for Host-Vector-Predator Nonlinear Model

    Prem Junswang1, Zulqurnain Sabir2, Muhammad Asif Zahoor Raja3, Soheil Salahshour4, Thongchai Botmart5,*, Wajaree Weera5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5823-5843, 2022, DOI:10.32604/cmc.2022.027629

    Abstract A novel design of the computational intelligent framework is presented to solve a class of host-vector-predator nonlinear model governed with set of ordinary differential equations. The host-vector-predator nonlinear model depends upon five groups or classes, host plant susceptible and infected populations, vectors population of susceptible and infected individuals and the predator population. An unsupervised artificial neural network is designed using the computational framework of local and global search competencies of interior-point algorithm and genetic algorithms. For solving the host-vector-predator nonlinear model, a merit function is constructed using the differential model and its associated boundary conditions. The optimization of this merit… More >

  • Open Access

    ARTICLE

    Spider Monkey Optimization with Statistical Analysis for Robust Rainfall Prediction

    Mahmoud Ragab1,2,3,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 4143-4155, 2022, DOI:10.32604/cmc.2022.027075

    Abstract Rainfall prediction becomes popular in real time environment due to the developments of recent technologies. Accurate and fast rainfall predictive models can be designed by the use of machine learning (ML), statistical models, etc. Besides, feature selection approaches can be derived for eliminating the curse of dimensionality problems. In this aspect, this paper presents a novel chaotic spider money optimization with optimal kernel ridge regression (CSMO-OKRR) model for accurate rainfall prediction. The goal of the CSMO-OKRR technique is to properly predict the rainfall using the weather data. The proposed CSMO-OKRR technique encompasses three major processes namely feature selection, prediction, and… More >

  • Open Access

    ARTICLE

    Application of Machine Learning for Tool Condition Monitoring in Turning

    A. D. Patange1,2, R. Jegadeeshwaran1,*, N. S. Bajaj2, A. N. Khairnar2, N. A. Gavade2

    Sound & Vibration, Vol.56, No.2, pp. 127-145, 2022, DOI:10.32604/sv.2022.014910

    Abstract

    The machining process is primarily used to remove material using cutting tools. Any variation in tool state affects the quality of a finished job and causes disturbances. So, a tool monitoring scheme (TMS) for categorization and supervision of failures has become the utmost priority. To respond, traditional TMS followed by the machine learning (ML) analysis is advocated in this paper. Classification in ML is supervised based learning method wherein the ML algorithm learn from the training data input fed to it and then employ this model to categorize the new datasets for precise prediction of a class and observation. In… More >

  • Open Access

    ARTICLE

    Archery Algorithm: A Novel Stochastic Optimization Algorithm for Solving Optimization Problems

    Fatemeh Ahmadi Zeidabadi1, Mohammad Dehghani2, Pavel Trojovský2,*, Štěpán Hubálovský3, Victor Leiva4, Gaurav Dhiman5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 399-416, 2022, DOI:10.32604/cmc.2022.024736

    Abstract Finding a suitable solution to an optimization problem designed in science is a major challenge. Therefore, these must be addressed utilizing proper approaches. Based on a random search space, optimization algorithms can find acceptable solutions to problems. Archery Algorithm (AA) is a new stochastic approach for addressing optimization problems that is discussed in this study. The fundamental idea of developing the suggested AA is to imitate the archer's shooting behavior toward the target panel. The proposed algorithm updates the location of each member of the population in each dimension of the search space by a member randomly marked by the… More >

  • Open Access

    ARTICLE

    Cancelable Multi-biometric Template Generation Based on Dual-Tree Complex Wavelet Transform

    Ahmed M. Ayoup1,*, Ashraf A. M. Khalaf1, Fahad Alraddady2, Fathi E. Abd El-Samie3, Walid El-Shafai3,5, Salwa M. Serag Eldin2,4

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 1289-1304, 2022, DOI:10.32604/iasc.2022.024381

    Abstract In this article, we introduce a new cancelable biometric template generation layout depending on selective encryption technology and Dual-Tree Complex Wavelet Transform (DT-CWT) fusion. The input face biometric is entered into the automatic face-segmentation (Viola-Jones) algorithm to detect the object in a short time. Viola-Jones algorithm can detect the left eye, right eye, nose, and mouth of the input biometric image. The encoder can choose the left or right eye to generate a cancelable biometric template. The selected eye image of size M × N is XORed with the created pseudo-random number (PRN) matrix CM × N to provide an… More >

Displaying 31-40 on page 4 of 123. Per Page