Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Experimental Performance Analysis of a Corrugation Type Solar Air Heater (CTSAH)

    Aravindh Madhavankutty Ambika1,2,*, Aarjab Ghimire2, Sreekumar Appukuttan2

    Energy Engineering, Vol.119, No.4, pp. 1483-1499, 2022, DOI:10.32604/ee.2022.017618

    Abstract This paper explains the experimental performance evaluation of a Corrugated Type Solar Air Heater (CTSAH) for understanding its performance in a humid tropical climatic condition in Puducherry, India. This helps in understanding its effectiveness in using it for drying application of products like seafood, etc. Experiments were conducted at different mass flow rates and their effect on the heat gain, efficiency, friction factor heat transfer, etc., was analyzed. Experiments were carried out at different mass flow rates, i.e., M1 = 0.06 kg/s, M2 = 0.14 kg/s, M3 = 0.17 kg/s, M4 = 0.25 kg/s, M5 = 0.3 kg/s, and were conducted from 11:00… More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user… More >

  • Open Access

    ARTICLE

    Mathematical Modelling of Quantum Kernel Method for Biomedical Data Analysis

    Mahmoud Ragab1,2,3, Ehab Bahauden Ashary4, Maha Farouk S. Sabir5, Adel A. Bahaddad5, Romany F. Mansour6,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5441-5457, 2022, DOI:10.32604/cmc.2022.024545

    Abstract This study presents a novel method to detect the medical application based on Quantum Computing (QC) and a few Machine Learning (ML) systems. QC has a primary advantage i.e., it uses the impact of quantum parallelism to provide the consequences of prime factorization issue in a matter of seconds. So, this model is suggested for medical application only by recent researchers. A novel strategy i.e., Quantum Kernel Method (QKM) is proposed in this paper for data prediction. In this QKM process, Linear Tunicate Swarm Algorithm (LTSA), the optimization technique is used to calculate the loss function initially and is aimed… More >

  • Open Access

    ARTICLE

    A Novel Hybrid Tunicate Swarm Naked Mole-Rat Algorithm for Image Segmentation and Numerical Optimization

    Supreet Singh1,2, Nitin Mittal1, Urvinder Singh2, Rohit Salgotra2, Atef Zaguia3, Dilbag Singh4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3445-3462, 2022, DOI:10.32604/cmc.2022.023004

    Abstract This paper provides a new optimization algorithm named as tunicate swarm naked mole-rat algorithm (TSNMRA) which uses hybridization concept of tunicate swarm algorithm (TSA) and naked mole-rat algorithm (NMRA). This newly developed algorithm uses the characteristics of both algorithms (TSA and NMRA) and enhance the exploration abilities of NMRA. Apart from the hybridization concept, important parameter of NMRA such as mating factor is made to be self-adaptive with the help of simulated annealing mutation operator and there is no need to define its value manually. For evaluating the working capabilities of proposed TSNMRA, it is tested for 100-digit challenge (CEC… More >

  • Open Access

    ARTICLE

    C5.0 Decision Tree Model Using Tsallis Entropy and Association Function for General and Medical Dataset

    Uma K.V1,*, Appavu alias Balamurugan S2

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 61-70, 2020, DOI:10.31209/2019.100000153

    Abstract Real world data consists of lot of impurities. Entropy measure will help to handle impurities in a better way. Here, data selection is done by using Naïve Bayes’ theorem. The sample which has posterior probability value greater than that of the threshold value is selected. C5.0 decision tree classifier is taken as base and modified the Gain calculation function using Tsallis entropy and Association function. The proposed classifier model provides more accuracy and smaller tree for general and Medical dataset. Precision value obtained for Medical dataset is more than that of existing method. More >

Displaying 1-10 on page 1 of 5. Per Page