Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (300)
  • Open Access

    ARTICLE

    Advanced Machine Learning Methods for Prediction of Blast-Induced Flyrock Using Hybrid SVR Methods

    Ji Zhou1,2, Yijun Lu3, Qiong Tian1,2, Haichuan Liu3, Mahdi Hasanipanah4,5,*, Jiandong Huang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1595-1617, 2024, DOI:10.32604/cmes.2024.048398

    Abstract Blasting in surface mines aims to fragment rock masses to a proper size. However, flyrock is an undesirable effect of blasting that can result in human injuries. In this study, support vector regression (SVR) is combined with four algorithms: gravitational search algorithm (GSA), biogeography-based optimization (BBO), ant colony optimization (ACO), and whale optimization algorithm (WOA) for predicting flyrock in two surface mines in Iran. Additionally, three other methods, including artificial neural network (ANN), kernel extreme learning machine (KELM), and general regression neural network (GRNN), are employed, and their performances are compared to those of four More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Gender Classification Accuracy across Varied Geographic Regions through the Application of Deep Learning Algorithms to Speech Signals

    Abhishek Singhal*, Devendra Kumar Sharma

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 609-625, 2024, DOI:10.32604/csse.2023.046730

    Abstract This article presents an exhaustive comparative investigation into the accuracy of gender identification across diverse geographical regions, employing a deep learning classification algorithm for speech signal analysis. In this study, speech samples are categorized for both training and testing purposes based on their geographical origin. Category 1 comprises speech samples from speakers outside of India, whereas Category 2 comprises live-recorded speech samples from Indian speakers. Testing speech samples are likewise classified into four distinct sets, taking into consideration both geographical origin and the language spoken by the speakers. Significantly, the results indicate a noticeable difference… More >

  • Open Access

    ARTICLE

    Path-Based Clustering Algorithm with High Scalability Using the Combined Behavior of Evolutionary Algorithms

    Leila Safari-Monjeghtapeh1, Mansour Esmaeilpour2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 705-721, 2024, DOI:10.32604/csse.2024.044892

    Abstract Path-based clustering algorithms typically generate clusters by optimizing a benchmark function. Most optimization methods in clustering algorithms often offer solutions close to the general optimal value. This study achieves the global optimum value for the criterion function in a shorter time using the minimax distance, Maximum Spanning Tree “MST”, and meta-heuristic algorithms, including Genetic Algorithm “GA” and Particle Swarm Optimization “PSO”. The Fast Path-based Clustering “FPC” algorithm proposed in this paper can find cluster centers correctly in most datasets and quickly perform clustering operations. The FPC does this operation using MST, the minimax distance, and… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Multi-Agent Reinforcement Learning Algorithms

    Abdulghani M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 337-352, 2024, DOI:10.32604/iasc.2024.047017

    Abstract Multi-Agent Reinforcement Learning (MARL) has proven to be successful in cooperative assignments. MARL is used to investigate how autonomous agents with the same interests can connect and act in one team. MARL cooperation scenarios are explored in recreational cooperative augmented reality environments, as well as real-world scenarios in robotics. In this paper, we explore the realm of MARL and its potential applications in cooperative assignments. Our focus is on developing a multi-agent system that can collaborate to attack or defend against enemies and achieve victory with minimal damage. To accomplish this, we utilize the StarCraft… More >

  • Open Access

    ARTICLE

    Forecasting the Academic Performance by Leveraging Educational Data Mining

    Mozamel M. Saeed*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 213-231, 2024, DOI:10.32604/iasc.2024.043020

    Abstract The study aims to recognize how efficiently Educational Data Mining (EDM) integrates into Artificial Intelligence (AI) to develop skills for predicting students’ performance. The study used a survey questionnaire and collected data from 300 undergraduate students of Al Neelain University. The first step’s initial population placements were created using Particle Swarm Optimization (PSO). Then, using adaptive feature space search, Educational Grey Wolf Optimization (EGWO) was employed to choose the optimal attribute combination. The second stage uses the SVM classifier to forecast classification accuracy. Different classifiers were utilized to evaluate the performance of students. According to… More >

  • Open Access

    ARTICLE

    Appropriate Combination of Crossover Operator and Mutation Operator in Genetic Algorithms for the Travelling Salesman Problem

    Zakir Hussain Ahmed1,*, Habibollah Haron2, Abdullah Al-Tameem3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2399-2425, 2024, DOI:10.32604/cmc.2024.049704

    Abstract Genetic algorithms (GAs) are very good metaheuristic algorithms that are suitable for solving NP-hard combinatorial optimization problems. A simple GA begins with a set of solutions represented by a population of chromosomes and then uses the idea of survival of the fittest in the selection process to select some fitter chromosomes. It uses a crossover operator to create better offspring chromosomes and thus, converges the population. Also, it uses a mutation operator to explore the unexplored areas by the crossover operator, and thus, diversifies the GA search space. A combination of crossover and mutation operators… More >

  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine… More >

  • Open Access

    ARTICLE

    Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners: A Recommendation System

    Ameni Ellouze1, Nesrine Kadri2, Alaa Alaerjan3,*, Mohamed Ksantini1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 351-372, 2024, DOI:10.32604/cmc.2024.048061

    Abstract Recognizing human activity (HAR) from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases. Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not. Typically, smartphones and their associated sensing devices operate in distributed and unstable environments. Therefore, collecting their data and extracting useful information is a significant challenge. In this context, the aim of this paper is twofold: The first is to analyze human behavior based on the recognition of physical activities. Using the… More >

  • Open Access

    ARTICLE

    Automated Algorithms for Detecting and Classifying X-Ray Images of Spine Fractures

    Fayez Alfayez*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1539-1560, 2024, DOI:10.32604/cmc.2024.046443

    Abstract This paper emphasizes a faster digital processing time while presenting an accurate method for identifying spine fractures in X-ray pictures. The study focuses on efficiency by utilizing many methods that include picture segmentation, feature reduction, and image classification. Two important elements are investigated to reduce the classification time: Using feature reduction software and leveraging the capabilities of sophisticated digital processing hardware. The researchers use different algorithms for picture enhancement, including the Wiener and Kalman filters, and they look into two background correction techniques. The article presents a technique for extracting textural features and evaluates three… More >

Displaying 11-20 on page 2 of 300. Per Page