Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (286)
  • Open Access

    ARTICLE

    Ligand Based Virtual Screening of Molecular Compounds in Drug Discovery Using GCAN Fingerprint and Ensemble Machine Learning Algorithm

    R. Ani1,*, O. S. Deepa2, B. R. Manju1

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3033-3048, 2023, DOI:10.32604/csse.2023.033807

    Abstract The drug development process takes a long time since it requires sorting through a large number of inactive compounds from a large collection of compounds chosen for study and choosing just the most pertinent compounds that can bind to a disease protein. The use of virtual screening in pharmaceutical research is growing in popularity. During the early phases of medication research and development, it is crucial. Chemical compound searches are now more narrowly targeted. Because the databases contain more and more ligands, this method needs to be quick and exact. Neural network fingerprints were created more effectively than the well-known… More >

  • Open Access

    ARTICLE

    Cascade Human Activity Recognition Based on Simple Computations Incorporating Appropriate Prior Knowledge

    Jianguo Wang1, Kuan Zhang1,*, Yuesheng Zhao2,*, Xiaoling Wang2, Muhammad Shamrooz Aslam2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 79-96, 2023, DOI:10.32604/cmc.2023.040506

    Abstract The purpose of Human Activities Recognition (HAR) is to recognize human activities with sensors like accelerometers and gyroscopes. The normal research strategy is to obtain better HAR results by finding more efficient eigenvalues and classification algorithms. In this paper, we experimentally validate the HAR process and its various algorithms independently. On the base of which, it is further proposed that, in addition to the necessary eigenvalues and intelligent algorithms, correct prior knowledge is even more critical. The prior knowledge mentioned here mainly refers to the physical understanding of the analyzed object, the sampling process, the sampling data, the HAR algorithm,… More >

  • Open Access

    ARTICLE

    An Enhanced Automatic Arabic Essay Scoring System Based on Machine Learning Algorithms

    Nourmeen Lotfy1, Abdulaziz Shehab1,2,*, Mohammed Elhoseny1,3, Ahmed Abu-Elfetouh1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1227-1249, 2023, DOI:10.32604/cmc.2023.039185

    Abstract Despite the extensive effort to improve intelligent educational tools for smart learning environments, automatic Arabic essay scoring remains a big research challenge. The nature of the writing style of the Arabic language makes the problem even more complicated. This study designs, implements, and evaluates an automatic Arabic essay scoring system. The proposed system starts with pre-processing the student answer and model answer dataset using data cleaning and natural language processing tasks. Then, it comprises two main components: the grading engine and the adaptive fusion engine. The grading engine employs string-based and corpus-based similarity algorithms separately. After that, the adaptive fusion… More >

  • Open Access

    ARTICLE

    Comparative Evaluation of Data Mining Algorithms in Breast Cancer

    Fuad A. M. Al-Yarimi*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 633-645, 2023, DOI:10.32604/cmc.2023.038858

    Abstract Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer. The only method to avoid breast cancer-related deaths is through early detection and treatment. The proper classification of malignancies is one of the most significant challenges in the medical industry. Due to their high precision and accuracy, machine learning techniques are extensively employed for identifying and classifying various forms of cancer. Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for… More >

  • Open Access

    ARTICLE

    Identification of High-Risk Scenarios for Cascading Failures in New Energy Power Grids Based on Deep Embedding Clustering Algorithms

    Xueting Cheng1, Ziqi Zhang2,*, Yueshuang Bao1, Huiping Zheng1

    Energy Engineering, Vol.120, No.11, pp. 2517-2529, 2023, DOI:10.32604/ee.2023.042633

    Abstract At present, the proportion of new energy in the power grid is increasing, and the random fluctuations in power output increase the risk of cascading failures in the power grid. In this paper, we propose a method for identifying high-risk scenarios of interlocking faults in new energy power grids based on a deep embedding clustering (DEC) algorithm and apply it in a risk assessment of cascading failures in different operating scenarios for new energy power grids. First, considering the real-time operation status and system structure of new energy power grids, the scenario cascading failure risk indicator is established. Based on… More >

  • Open Access

    ARTICLE

    Ensemble of Population-Based Metaheuristic Algorithms

    Hao Li, Jun Tang*, Qingtao Pan, Jianjun Zhan, Songyang Lao

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2835-2859, 2023, DOI:10.32604/cmc.2023.038670

    Abstract No optimization algorithm can obtain satisfactory results in all optimization tasks. Thus, it is an effective way to deal with the problem by an ensemble of multiple algorithms. This paper proposes an ensemble of population-based metaheuristics (EPM) to solve single-objective optimization problems. The design of the EPM framework includes three stages: the initial stage, the update stage, and the final stage. The framework applies the transformation of the real and virtual population to balance the problem of exploration and exploitation at the population level and uses an elite strategy to communicate among virtual populations. The experiment tested two benchmark function… More >

  • Open Access

    ARTICLE

    Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972

    Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested approach involves using CS to… More >

  • Open Access

    ARTICLE

    Ensuring Information Security in Smart Door Lock Systems Using the Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Cyber Security, Vol.4, No.4, pp. 269-286, 2022, DOI:10.32604/jcs.2023.041707

    Abstract The widespread use of Internet of Things (IoT) devices, such as smart appliances, phones, and watches, has brought about concerns regarding security and privacy. With the increasing prevalence of cyberattacks from both malicious and non-malicious sources, security has become a critical factor in the design of IoT systems. In particular, data security poses a significant challenge due to the growing amount of data stored in IoT systems. Inadequate security measures can allow hackers to take over IoT devices remotely, resulting in significant damage. To address these concerns and improve the security of IoT-based smart door lock systems, this research proposes… More >

  • Open Access

    ARTICLE

    Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms

    Nizheen A. Ali1, Ramadhan J. Mstafa2,3,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1451-1469, 2023, DOI:10.32604/csse.2023.039957

    Abstract With the widespread use of the internet, there is an increasing need to ensure the security and privacy of transmitted data. This has led to an intensified focus on the study of video steganography, which is a technique that hides data within a video cover to avoid detection. The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency. This paper proposes a new method to video steganography, which involves utilizing a Genetic Algorithm (GA) for identifying the Region of Interest (ROI) in the cover video. The ROI… More >

  • Open Access

    ARTICLE

    Multi-Objective Optimization of Traffic Signal Timing at Typical Junctions Based on Genetic Algorithms

    Zeyu Zhang1, Han Zhu1, Wei Zhang1, Zhiming Cai2,*, Linkai Zhu2, Zefeng Li2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1901-1917, 2023, DOI:10.32604/csse.2023.039395

    Abstract With the rapid development of urban road traffic and the increasing number of vehicles, how to alleviate traffic congestion is one of the hot issues that need to be urgently addressed in building smart cities. Therefore, in this paper, a nonlinear multi-objective optimization model of urban intersection signal timing based on a Genetic Algorithm was constructed. Specifically, a typical urban intersection was selected as the research object, and drivers’ acceleration habits were taken into account. What’s more, the shortest average delay time, the least average number of stops, and the maximum capacity of the intersection were regarded as the optimization… More >

Displaying 31-40 on page 4 of 286. Per Page