Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    CARE: Comprehensive Artificial Intelligence Techniques for Reliable Autism Evaluation in Pediatric Care

    Jihoon Moon1, Jiyoung Woo2,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1383-1425, 2025, DOI:10.32604/cmc.2025.067784 - 29 August 2025

    Abstract Improving early diagnosis of autism spectrum disorder (ASD) in children increasingly relies on predictive models that are reliable and accessible to non-experts. This study aims to develop such models using Python-based tools to improve ASD diagnosis in clinical settings. We performed exploratory data analysis to ensure data quality and identify key patterns in pediatric ASD data. We selected the categorical boosting (CatBoost) algorithm to effectively handle the large number of categorical variables. We used the PyCaret automated machine learning (AutoML) tool to make the models user-friendly for clinicians without extensive machine learning expertise. In addition,… More >

  • Open Access

    ARTICLE

    Semantic Malware Classification Using Artificial Intelligence Techniques

    Eliel Martins1, Javier Bermejo Higuera2,*, Ricardo Sant’Ana1, Juan Ramón Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, Diego Piedrahita Castillo3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3031-3067, 2025, DOI:10.32604/cmes.2025.061080 - 03 March 2025

    Abstract The growing threat of malware, particularly in the Portable Executable (PE) format, demands more effective methods for detection and classification. Machine learning-based approaches exhibit their potential but often neglect semantic segmentation of malware files that can improve classification performance. This research applies deep learning to malware detection, using Convolutional Neural Network (CNN) architectures adapted to work with semantically extracted data to classify malware into malware families. Starting from the Malconv model, this study introduces modifications to adapt it to multi-classification tasks and improve its performance. It proposes a new innovative method that focuses on byte More >

  • Open Access

    ARTICLE

    Evaluating Effect of Magnetic Field on Nusselt Number and Friction Factor of Fe3O4-TiO2/Water Nanofluids in Heat-Sink Using Artificial Intelligence Techniques

    L. S. Sundar*, Sérgio M. O. Tavares, António M. B. Pereira, Antonio C. M. Sousa

    Frontiers in Heat and Mass Transfer, Vol.23, No.1, pp. 131-162, 2025, DOI:10.32604/fhmt.2025.055854 - 26 February 2025

    Abstract The experimental analysis takes too much time-consuming process and requires considerable effort, while, the Artificial Neural Network (ANN) algorithms are simple, affordable, and fast, and they allow us to make a relevant analysis in establishing an appropriate relationship between the input and output parameters. This paper deals with the use of back-propagation ANN algorithms for the experimental data of heat transfer coefficient, Nusselt number, and friction factor of water-based Fe3O4-TiO2 magnetic hybrid nanofluids in a mini heat sink under magnetic fields. The data considered for the ANN network is at different Reynolds numbers (239 to 1874),… More >

  • Open Access

    ARTICLE

    Using Artificial Intelligence Techniques in the Requirement Engineering Stage of Traditional SDLC Process

    Afam Okonkwo*, Pius Onobhayedo, Charles Igah

    Journal on Artificial Intelligence, Vol.6, pp. 379-401, 2024, DOI:10.32604/jai.2024.058649 - 31 December 2024

    Abstract Artificial Intelligence, in general, and particularly Natural language Processing (NLP) has made unprecedented progress recently in many areas of life, automating and enabling a lot of activities such as speech recognition, language translations, search engines, and text-generations, among others. Software engineering and Software Development Life Cycle (SDLC) is also not left out. Indeed, one of the most critical starting points of SDLC is the requirement engineering stage which, traditionally, has been dominated by business analysts. Unfortunately, these analysts have always done the job not just in a monotonous way, but also in an error-prone, tedious,… More >

  • Open Access

    ARTICLE

    Evaluating Public Sentiments during Uttarakhand Flood: An Artificial Intelligence Techniques

    Stephen Afrifa1,2,*, Vijayakumar Varadarajan3,4,5,*, Peter Appiahene2, Tao Zhang1, Richmond Afrifa6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1625-1639, 2024, DOI:10.32604/csse.2024.055084 - 22 November 2024

    Abstract Users of social networks can readily express their thoughts on websites like Twitter (now X), Facebook, and Instagram. The volume of textual data flowing from users has greatly increased with the advent of social media in comparison to traditional media. For instance, using natural language processing (NLP) methods, social media can be leveraged to obtain crucial information on the present situation during disasters. In this work, tweets on the Uttarakhand flash flood are analyzed using a hybrid NLP model. This investigation employed sentiment analysis (SA) to determine the people’s expressed negative attitudes regarding the disaster. More >

  • Open Access

    REVIEW

    Discrete Choice Models and Artificial Intelligence Techniques for Predicting the Determinants of Transport Mode Choice—A Systematic Review

    Mujahid Ali*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2161-2194, 2024, DOI:10.32604/cmc.2024.058888 - 18 November 2024

    Abstract Forecasting travel demand requires a grasp of individual decision-making behavior. However, transport mode choice (TMC) is determined by personal and contextual factors that vary from person to person. Numerous characteristics have a substantial impact on travel behavior (TB), which makes it important to take into account while studying transport options. Traditional statistical techniques frequently presume linear correlations, but real-world data rarely follows these presumptions, which may make it harder to grasp the complex interactions. Thorough systematic review was conducted to examine how machine learning (ML) approaches might successfully capture nonlinear correlations that conventional methods may… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Prediction of One-Part Geopolymer Compressive Strength for Sustainable Concrete

    Mohamed Abdel-Mongy1, Mudassir Iqbal2, M. Farag3, Ahmed. M. Yosri1,*, Fahad Alsharari1, Saif Eldeen A. S. Yousef4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 525-543, 2024, DOI:10.32604/cmes.2024.052505 - 20 August 2024

    Abstract Alkali-activated materials/geopolymer (AAMs), due to their low carbon emission content, have been the focus of recent studies on ecological concrete. In terms of performance, fly ash and slag are preferred materials for precursors for developing a one-part geopolymer. However, determining the optimum content of the input parameters to obtain adequate performance is quite challenging and scarcely reported. Therefore, in this study, machine learning methods such as artificial neural networks (ANN) and gene expression programming (GEP) models were developed using MATLAB and GeneXprotools, respectively, for the prediction of compressive strength under variable input materials and content… More >

  • Open Access

    ARTICLE

    Learning-Related Sentiment Detection, Classification, and Application for a Quality Education Using Artificial Intelligence Techniques

    Samah Alhazmi1,*, Shahnawaz Khan2, Mohammad Haider Syed1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3487-3499, 2023, DOI:10.32604/iasc.2023.036297 - 15 March 2023

    Abstract Quality education is one of the primary objectives of any nation-building strategy and is one of the seventeen Sustainable Development Goals (SDGs) by the United Nations. To provide quality education, delivering top-quality content is not enough. However, understanding the learners’ emotions during the learning process is equally important. However, most of this research work uses general data accessed from Twitter or other publicly available databases. These databases are generally not an ideal representation of the actual learning process and the learners’ sentiments about the learning process. This research has collected real data from the learners, More >

  • Open Access

    ARTICLE

    Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3131-3144, 2022, DOI:10.32604/cmc.2022.026457 - 29 March 2022

    Abstract Education 4.0 is being authorized more and more by the design of artificial intelligence (AI) techniques. Higher education institutions (HEI) have started to utilize Internet technologies to improve the quality of the service and boost knowledge. Due to the unavailability of information technology (IT) infrastructures, HEI is vulnerable to cyberattacks. Biometric authentication can be used to authenticate a person based on biological features such as face, fingerprint, iris, and so on. This study designs a novel search and rescue optimization with deep learning based learning authentication technique for cybersecurity in higher education institutions, named SRODL-LAC… More >

  • Open Access

    ARTICLE

    Optimized Generative Adversarial Networks for Adversarial Sample Generation

    Daniyal M. Alghazzawi1, Syed Hamid Hasan1,*, Surbhi Bhatia2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3877-3897, 2022, DOI:10.32604/cmc.2022.024613 - 29 March 2022

    Abstract Detecting the anomalous entity in real-time network traffic is a popular area of research in recent times. Very few researches have focused on creating malware that fools the intrusion detection system and this paper focuses on this topic. We are using Deep Convolutional Generative Adversarial Networks (DCGAN) to trick the malware classifier to believe it is a normal entity. In this work, a new dataset is created to fool the Artificial Intelligence (AI) based malware detectors, and it consists of different types of attacks such as Denial of Service (DoS), scan 11, scan 44, botnet,… More >

Displaying 1-10 on page 1 of 13. Per Page