Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (317)
  • Open Access

    ARTICLE

    Fuzzy Machine Learning-Based Algorithms for Mapping Cumin and Fennel Spices Crop Fields Using Sentinel-2 Satellite Data

    Shilpa Suman1, Abhishek Rawat2,*, Anil Kumar3, S. K. Tiwari4

    Revue Internationale de Géomatique, Vol.33, pp. 363-381, 2024, DOI:10.32604/rig.2024.053981 - 18 September 2024

    Abstract In this study, the impact of the training sample selection method on the performance of fuzzy-based Possibilistic c-means (PCM) and Noise Clustering (NC) classifiers were examined and mapped the cumin and fennel rabi crop. Two training sample selection approaches that have been investigated in this study are “mean” and “individual sample as mean”. Both training sample techniques were applied to the PCM and NC classifiers to classify the two indices approach. Both approaches have been studied to decrease spectral information in temporal data processing. The Modified Soil Adjusted Vegetation Index 2 (MSAVI-2) and Class-Based Sensor… More >

  • Open Access

    ARTICLE

    Solving the Generalized Traveling Salesman Problem Using Sequential Constructive Crossover Operator in Genetic Algorithm

    Zakir Hussain Ahmed1,*, Maha Ata Al-Furhood2, Abdul Khader Jilani Saudagar3, Shakir Khan4

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1113-1131, 2024, DOI:10.32604/csse.2024.053574 - 13 September 2024

    Abstract The generalized travelling salesman problem (GTSP), a generalization of the well-known travelling salesman problem (TSP), is considered for our study. Since the GTSP is NP-hard and very complex, finding exact solutions is highly expensive, we will develop genetic algorithms (GAs) to obtain heuristic solutions to the problem. In GAs, as the crossover is a very important process, the crossover methods proposed for the traditional TSP could be adapted for the GTSP. The sequential constructive crossover (SCX) and three other operators are adapted to use in GAs to solve the GTSP. The effectiveness of GA using More >

  • Open Access

    ARTICLE

    Performance Evaluation of Machine Learning Algorithms in Reduced Dimensional Spaces

    Kaveh Heidary1,*, Venkata Atluri1, John Bland2

    Journal of Cyber Security, Vol.6, pp. 69-87, 2024, DOI:10.32604/jcs.2024.051196 - 28 August 2024

    Abstract This paper investigates the impact of reducing feature-vector dimensionality on the performance of machine learning (ML) models. Dimensionality reduction and feature selection techniques can improve computational efficiency, accuracy, robustness, transparency, and interpretability of ML models. In high-dimensional data, where features outnumber training instances, redundant or irrelevant features introduce noise, hindering model generalization and accuracy. This study explores the effects of dimensionality reduction methods on binary classifier performance using network traffic data for cybersecurity applications. The paper examines how dimensionality reduction techniques influence classifier operation and performance across diverse performance metrics for seven ML models. Four… More >

  • Open Access

    ARTICLE

    Optimizing Connections: Applied Shortest Path Algorithms for MANETs

    Ibrahim Alameri1,*, Jitka Komarkova2, Tawfik Al-Hadhrami3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 787-807, 2024, DOI:10.32604/cmes.2024.052107 - 20 August 2024

    Abstract This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks (MANETs) from dynamic topologies that pose great challenges because of the mobility of nodes. The main objective was to delve into and refine the application of the Dijkstra's algorithm in this context, a method conventionally esteemed for its efficiency in static networks. Thus, this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm, considering adaptation to the dynamic network conditions that are typical for MANETs. This paper has shown through detailed algorithmic analysis that Dijkstra’s… More >

  • Open Access

    ARTICLE

    Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms

    Zaed Mahdi1,*, Nada Abdalhussien2, Naba Mahmood1, Rana Zaki3,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2139-2159, 2024, DOI:10.32604/cmc.2024.053542 - 15 August 2024

    Abstract The primary concern of modern technology is cyber attacks targeting the Internet of Things. As it is one of the most widely used networks today and vulnerable to attacks. Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things (IoT) networks, as devices can be monitored or service isolated from them and affect users in one way or another. Securing Internet of Things networks is an important matter, as it requires the use of modern technologies and methods, and real and up-to-date data to design and train systems… More >

  • Open Access

    REVIEW

    A Review of Image Steganography Based on Multiple Hashing Algorithm

    Abdullah Alenizi1, Mohammad Sajid Mohammadi2, Ahmad A. Al-Hajji2, Arshiya Sajid Ansari1,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2463-2494, 2024, DOI:10.32604/cmc.2024.051826 - 15 August 2024

    Abstract Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item. From ancient times to the present, the security of secret or vital information has always been a significant problem. The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest. Therefore, several approaches, including steganography, have been developed by researchers over time to enable safe data transit. In this review, we have discussed image steganography based on Discrete Cosine Transform (DCT) algorithm, etc. We have also discussed image steganography based… More >

  • Open Access

    REVIEW

    A Systematic Review of Computer Vision Techniques for Quality Control in End-of-Line Visual Inspection of Antenna Parts

    Zia Ullah1,2,*, Lin Qi1, E. J. Solteiro Pires2, Arsénio Reis2, Ricardo Rodrigues Nunes2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2387-2421, 2024, DOI:10.32604/cmc.2024.047572 - 15 August 2024

    Abstract The rapid evolution of wireless communication technologies has underscored the critical role of antennas in ensuring seamless connectivity. Antenna defects, ranging from manufacturing imperfections to environmental wear, pose significant challenges to the reliability and performance of communication systems. This review paper navigates the landscape of antenna defect detection, emphasizing the need for a nuanced understanding of various defect types and the associated challenges in visual detection. This review paper serves as a valuable resource for researchers, engineers, and practitioners engaged in the design and maintenance of communication systems. The insights presented here pave the way… More >

  • Open Access

    ARTICLE

    Phishing Attacks Detection Using Ensemble Machine Learning Algorithms

    Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1325-1345, 2024, DOI:10.32604/cmc.2024.051778 - 18 July 2024

    Abstract Phishing, an Internet fraud where individuals are deceived into revealing critical personal and account information, poses a significant risk to both consumers and web-based institutions. Data indicates a persistent rise in phishing attacks. Moreover, these fraudulent schemes are progressively becoming more intricate, thereby rendering them more challenging to identify. Hence, it is imperative to utilize sophisticated algorithms to address this issue. Machine learning is a highly effective approach for identifying and uncovering these harmful behaviors. Machine learning (ML) approaches can identify common characteristics in most phishing assaults. In this paper, we propose an ensemble approach… More >

  • Open Access

    REVIEW

    Systematic Review: Load Balancing in Cloud Computing by Using Metaheuristic Based Dynamic Algorithms

    Darakhshan Syed*, Ghulam Muhammad, Safdar Rizvi

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 437-476, 2024, DOI:10.32604/iasc.2024.050681 - 11 July 2024

    Abstract Cloud Computing has the ability to provide on-demand access to a shared resource pool. It has completely changed the way businesses are managed, implement applications, and provide services. The rise in popularity has led to a significant increase in the user demand for services. However, in cloud environments efficient load balancing is essential to ensure optimal performance and resource utilization. This systematic review targets a detailed description of load balancing techniques including static and dynamic load balancing algorithms. Specifically, metaheuristic-based dynamic load balancing algorithms are identified as the optimal solution in case of increased traffic. More >

  • Open Access

    ARTICLE

    AFBNet: A Lightweight Adaptive Feature Fusion Module for Super-Resolution Algorithms

    Lirong Yin1, Lei Wang1, Siyu Lu2,*, Ruiyang Wang2, Haitao Ren2, Ahmed AlSanad3, Salman A. AlQahtani3, Zhengtong Yin4, Xiaolu Li5, Wenfeng Zheng3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2315-2347, 2024, DOI:10.32604/cmes.2024.050853 - 08 July 2024

    Abstract At present, super-resolution algorithms are employed to tackle the challenge of low image resolution, but it is difficult to extract differentiated feature details based on various inputs, resulting in poor generalization ability. Given this situation, this study first analyzes the features of some feature extraction modules of the current super-resolution algorithm and then proposes an adaptive feature fusion block (AFB) for feature extraction. This module mainly comprises dynamic convolution, attention mechanism, and pixel-based gating mechanism. Combined with dynamic convolution with scale information, the network can extract more differentiated feature information. The introduction of a channel More >

Displaying 11-20 on page 2 of 317. Per Page