Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (171)
  • Open Access

    ARTICLE

    Urban Electric Vehicle Charging Station Placement Optimization with Graylag Goose Optimization Voting Classifier

    Amel Ali Alhussan1, Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,*, Marwa M. Eid2,3, Abdelhameed Ibrahim4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1163-1177, 2024, DOI:10.32604/cmc.2024.049001

    Abstract To reduce the negative effects that conventional modes of transportation have on the environment, researchers are working to increase the use of electric vehicles. The demand for environmentally friendly transportation may be hampered by obstacles such as a restricted range and extended rates of recharge. The establishment of urban charging infrastructure that includes both fast and ultra-fast terminals is essential to address this issue. Nevertheless, the powering of these terminals presents challenges because of the high energy requirements, which may influence the quality of service. Modelling the maximum hourly capacity of each station based on… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Detecting Malicious Uniform Resource Locators Using an Applied Intelligence Framework

    Simona-Vasilica Oprea*, Adela Bâra

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3827-3853, 2024, DOI:10.32604/cmc.2024.051598

    Abstract The potential of text analytics is revealed by Machine Learning (ML) and Natural Language Processing (NLP) techniques. In this paper, we propose an NLP framework that is applied to multiple datasets to detect malicious Uniform Resource Locators (URLs). Three categories of features, both ML and Deep Learning (DL) algorithms and a ranking schema are included in the proposed framework. We apply frequency and prediction-based embeddings, such as hash vectorizer, Term Frequency-Inverse Dense Frequency (TF-IDF) and predictors, word to vector-word2vec (continuous bag of words, skip-gram) from Google, to extract features from text. Further, we apply more… More >

  • Open Access

    CORRECTION

    Correction: Fine-Tuned Extra Tree Classifier for Thermal Comfort Sensation Prediction

    Ahmad Almadhor1, Chitapong Wechtaisong2,*, Usman Tariq3, Natalia Kryvinska4,*, Abdullah Al Hejaili5, Uzma Ghulam Mohammad6, Mohana Alanazi7

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 855-856, 2024, DOI:10.32604/csse.2024.052412

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Forecasting the Academic Performance by Leveraging Educational Data Mining

    Mozamel M. Saeed*

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 213-231, 2024, DOI:10.32604/iasc.2024.043020

    Abstract The study aims to recognize how efficiently Educational Data Mining (EDM) integrates into Artificial Intelligence (AI) to develop skills for predicting students’ performance. The study used a survey questionnaire and collected data from 300 undergraduate students of Al Neelain University. The first step’s initial population placements were created using Particle Swarm Optimization (PSO). Then, using adaptive feature space search, Educational Grey Wolf Optimization (EGWO) was employed to choose the optimal attribute combination. The second stage uses the SVM classifier to forecast classification accuracy. Different classifiers were utilized to evaluate the performance of students. According to… More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse… More >

  • Open Access

    ARTICLE

    CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems

    Talal Albalawi, P. Ganeshkumar*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3511-3528, 2024, DOI:10.32604/cmc.2024.046396

    Abstract The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution More >

  • Open Access

    ARTICLE

    Facial Image-Based Autism Detection: A Comparative Study of Deep Neural Network Classifiers

    Tayyaba Farhat1,2, Sheeraz Akram3,*, Hatoon S. AlSagri3, Zulfiqar Ali4, Awais Ahmad3, Arfan Jaffar1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 105-126, 2024, DOI:10.32604/cmc.2023.045022

    Abstract Autism Spectrum Disorder (ASD) is a neurodevelopmental condition characterized by significant challenges in social interaction, communication, and repetitive behaviors. Timely and precise ASD detection is crucial, particularly in regions with limited diagnostic resources like Pakistan. This study aims to conduct an extensive comparative analysis of various machine learning classifiers for ASD detection using facial images to identify an accurate and cost-effective solution tailored to the local context. The research involves experimentation with VGG16 and MobileNet models, exploring different batch sizes, optimizers, and learning rate schedulers. In addition, the “Orange” machine learning tool is employed to… More >

  • Open Access

    ARTICLE

    Fine-Tuned Extra Tree Classifier for Thermal Comfort Sensation Prediction

    Ahmad Almadhor1, Chitapong Wechtaisong2,*, Usman Tariq3, Natalia Kryvinska4,*, Abdullah Al Hejaili5, Uzma Ghulam Mohammad6, Mohana Alanazi7

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 199-216, 2024, DOI:10.32604/csse.2023.039546

    Abstract Thermal comfort is an essential component of smart cities that helps to upgrade, analyze, and realize intelligent buildings. It strongly affects human psychological and physiological levels. Residents of buildings suffer stress because of poor thermal comfort. Buildings frequently use Heating, Ventilation, and Air Conditioning (HVAC) systems for temperature control. Better thermal states directly impact people’s productivity and health. This study revealed a human thermal comfort model that makes better predictions of thermal sensation by identifying essential features and employing a tuned Extra Tree classifier, MultiLayer Perceptron (MLP) and Naive Bayes (NB) models. The study employs More >

  • Open Access

    ARTICLE

    Identification of an immune classifier for predicting the prognosis and therapeutic response in triple-negative breast cancer

    KUAILU LIN1,2, QIANYU GU2, XIXI LAI2,3,*

    BIOCELL, Vol.47, No.12, pp. 2681-2696, 2023, DOI:10.32604/biocell.2023.043298

    Abstract Objectives: Triple-negative breast cancer (TNBC) poses a significant challenge due to the lack of reliable prognostic gene signatures and an understanding of its immune behavior. Methods: We analyzed clinical information and mRNA expression data from 162 TNBC patients in TCGA-BRCA and 320 patients in METABRIC-BRCA. Utilizing weighted gene coexpression network analysis, we pinpointed 34 TNBC immune genes linked to survival. The least absolute shrinkage and selection operator Cox regression method identified key TNBC immune candidates for prognosis prediction. We calculated chemotherapy sensitivity scores using the “pRRophetic” package in R software and assessed immunotherapy response using the… More >

Displaying 1-10 on page 1 of 171. Per Page