Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (286)
  • Open Access

    ARTICLE

    Accurate Machine Learning Predictions of Sci-Fi Film Performance

    Amjed Al Fahoum1,*, Tahani A. Ghobon2

    Journal of New Media, Vol.5, No.1, pp. 1-22, 2023, DOI:10.32604/jnm.2023.037583

    Abstract A groundbreaking method is introduced to leverage machine learning algorithms to revolutionize the prediction of success rates for science fiction films. In the captivating world of the film industry, extensive research and accurate forecasting are vital to anticipating a movie’s triumph prior to its debut. Our study aims to harness the power of available data to estimate a film’s early success rate. With the vast resources offered by the internet, we can access a plethora of movie-related information, including actors, directors, critic reviews, user reviews, ratings, writers, budgets, genres, Facebook likes, YouTube views for movie trailers, and Twitter followers. The… More >

  • Open Access

    ARTICLE

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms

    Shehab Abdulhabib Alzaeemi1, Kim Gaik Tay1,*, Audrey Huong1, Saratha Sathasivam2, Majid Khan bin Majahar Ali2

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1163-1184, 2023, DOI:10.32604/csse.2023.038912

    Abstract Radial Basis Function Neural Network (RBFNN) ensembles have long suffered from non-efficient training, where incorrect parameter settings can be computationally disastrous. This paper examines different evolutionary algorithms for training the Symbolic Radial Basis Function Neural Network (SRBFNN) through the behavior’s integration of satisfiability programming. Inspired by evolutionary algorithms, which can iteratively find the near-optimal solution, different Evolutionary Algorithms (EAs) were designed to optimize the producer output weight of the SRBFNN that corresponds to the embedded logic programming 2Satisfiability representation (SRBFNN-2SAT). The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA),… More >

  • Open Access

    ARTICLE

    Comparative Analysis for Evaluating Wind Energy Resources Using Intelligent Optimization Algorithms and Numerical Methods

    Musaed Alrashidi*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 491-513, 2023, DOI:10.32604/csse.2023.038628

    Abstract Statistical distributions are used to model wind speed, and the two-parameters Weibull distribution has proven its effectiveness at characterizing wind speed. Accurate estimation of Weibull parameters, the scale (c) and shape (k), is crucial in describing the actual wind speed data and evaluating the wind energy potential. Therefore, this study compares the most common conventional numerical (CN) estimation methods and the recent intelligent optimization algorithms (IOA) to show how precise estimation of c and k affects the wind energy resource assessments. In addition, this study conducts technical and economic feasibility studies for five sites in the northern part of Saudi… More >

  • Open Access

    ARTICLE

    Selection of Metaheuristic Algorithm to Design Wireless Sensor Network

    Rakhshan Zulfiqar1,2, Tariq Javed1, Zain Anwar Ali2,*, Eman H. Alkhammash3, Myriam Hadjouni4

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 985-1000, 2023, DOI:10.32604/iasc.2023.037248

    Abstract The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network performance. The longevity of the networks is mostly determined by the proportion of energy consumed and the sensor nodes’ access network. The optimal or ideal positioning of sensors improves the portable sensor networks effectiveness. Coverage and energy usage are mostly determined by successful sensor placement strategies. Nature-inspired algorithms are the most effective solution for short sensor lifetime. The primary objective of work is to conduct a comparative analysis of nature-inspired optimization for wireless sensor networks (WSNs’) maximum network coverage. Moreover, it identifies quantity… More >

  • Open Access

    ARTICLE

    An Efficient Approach Based on Remora Optimization Algorithm and Levy Flight for Intrusion Detection

    Abdullah Mujawib Alashjaee*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 235-254, 2023, DOI:10.32604/iasc.2023.036247

    Abstract With the recent increase in network attacks by threats, malware, and other sources, machine learning techniques have gained special attention for intrusion detection due to their ability to classify hundreds of features into normal system behavior or an attack attempt. However, feature selection is a vital preprocessing stage in machine learning approaches. This paper presents a novel feature selection-based approach, Remora Optimization Algorithm-Levy Flight (ROA-LF), to improve intrusion detection by boosting the ROA performance with LF. The developed ROA-LF is assessed using several evaluation measures on five publicly available datasets for intrusion detection: Knowledge discovery and data mining tools competition,… More >

  • Open Access

    REVIEW

    A Systematic Literature Review of Deep Learning Algorithms for Segmentation of the COVID-19 Infection

    Shroog Alshomrani*, Muhammad Arif, Mohammed A. Al Ghamdi

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5717-5742, 2023, DOI:10.32604/cmc.2023.038059

    Abstract Coronavirus has infected more than 753 million people, ranging in severity from one person to another, where more than six million infected people died worldwide. Computer-aided diagnostic (CAD) with artificial intelligence (AI) showed outstanding performance in effectively diagnosing this virus in real-time. Computed tomography is a complementary diagnostic tool to clarify the damage of COVID-19 in the lungs even before symptoms appear in patients. This paper conducts a systematic literature review of deep learning methods for classifying the segmentation of COVID-19 infection in the lungs. We used the methodology of systematic reviews and meta-analyses (PRISMA) flow method. This research aims… More >

  • Open Access

    ARTICLE

    Managing Health Treatment by Optimizing Complex Lab-Developed Test Configurations: A Health Informatics Perspective

    Uzma Afzal1, Tariq Mahmood2, Ali Mustafa Qamar3,*, Ayaz H. Khan4,5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6251-6267, 2023, DOI:10.32604/cmc.2023.037653

    Abstract A complex Laboratory Developed Test (LDT) is a clinical test developed within a single laboratory. It is typically configured from many feature constraints from clinical repositories, which are part of the existing Laboratory Information Management System (LIMS). Although these clinical repositories are automated, support for managing patient information with test results of an LDT is also integrated within the existing LIMS. Still, the support to configure LDTs design needs to be made available even in standard LIMS packages. The manual configuration of LDTs is a complex process and can generate configuration inconsistencies because many constraints between features can remain unsatisfied.… More >

  • Open Access

    ARTICLE

    A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks

    Seema Rani1, Anju1, Anupma Sangwan1, Krishna Kumar2, Kashif Nisar3, Tariq Rahim Soomro3, Ag. Asri Ag. Ibrahim4,*, Manoj Gupta5, Laxmi Chand5, Sadiq Ali Khan6

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5697-5715, 2023, DOI:10.32604/cmc.2023.033007

    Abstract In recent years, there has been a rapid growth in Underwater Wireless Sensor Networks (UWSNs). The focus of research in this area is now on solving the problems associated with large-scale UWSN. One of the major issues in such a network is the localization of underwater nodes. Localization is required for tracking objects and detecting the target. It is also considered tagging of data where sensed contents are not found of any use without localization. This is useless for application until the position of sensed content is confirmed. This article’s major goal is to review and analyze underwater node localization… More >

  • Open Access

    ARTICLE

    Memory-Occupied Routing Algorithms for Quantum Relay Networks

    Jiangyuan Yao1, Kaiwen Zou2, Zheng Jiang2, Shuhua Weng1, Deshun Li1,*, Yahui Li3, Xingcan Cao4

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5929-5946, 2023, DOI:10.32604/cmc.2023.031284

    Abstract Quantum transmission experiments have shown that the successful transmission rate of entangled quanta in optical fibers decreases exponentially. Although current quantum networks deploy quantum relays to establish long-distance connections, the increase in transmission distance and entanglement switching costs still need to be considered when selecting the next hop. However, most of the existing quantum network models prefer to consider the parameters of the physical layer, which ignore the influence factors of the network layer. In this paper, we propose a meshy quantum network model based on quantum teleportation, which considers both network layer and physical layer parameters. The proposed model… More >

  • Open Access

    ARTICLE

    EVALUATION OF THE USE OF CONSTRAINTS IN STEP-BY-STEP ALGORITHMS FOR THE SOLUTION OF A 2D INVERSE HEAT TRANSFER PROBLEM

    Rodrigo Vidonscky Pintoa , Flávio Augusto Sanzovo Fiorellib,*

    Frontiers in Heat and Mass Transfer, Vol.19, pp. 1-10, 2022, DOI:10.5098/hmt.19.30

    Abstract The present paper provides a discussion about the use of constraints in step-by-step optimization algorithms used for the solution of a twodimensional inverse heat transfer problem containing a modeling error. It is observed that the unrestricted algorithms provided better estimates to the power map and the introduction of constraints is harmful to the solution of the inverse heat transfer problem, reducing the area in which this solution approaches the actual heat sources distribution, due to the solution of the unrestricted problem adopting negative values in restricted areas, which compensate the high sensitivity of this problem and consequently provide improved solutions. More >

Displaying 41-50 on page 5 of 286. Per Page