Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (122)
  • Open Access

    ARTICLE

    Robust Design Optimization and Improvement by Metamodel

    Shufang Song*, Lu Wang, Yuhua Yan

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 383-399, 2020, DOI:10.32604/cmes.2020.09588

    Abstract The robust design optimization (RDO) is an effective method to improve product performance with uncertainty factors. The robust optimal solution should be not only satisfied the probabilistic constraints but also less sensitive to the variation of design variables. There are some important issues in RDO, such as how to judge robustness, deal with multi-objective problem and black-box situation. In this paper, two criteria are proposed to judge the deterministic optimal solution whether satisfies robustness requirment. The robustness measure based on maximum entropy is proposed. Weighted sum method is improved to deal with the objective function, and the basic framework of… More >

  • Open Access

    ARTICLE

    Least-Square Support Vector Machine and Wavelet Selection for Hearing Loss Identification

    Chaosheng Tang1, Deepak Ranjan Nayak2, Shuihua Wang1,3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 299-313, 2020, DOI:10.32604/cmes.2020.011069

    Abstract Hearing loss (HL) is a kind of common illness, which can significantly reduce the quality of life. For example, HL often results in mishearing, misunderstanding, and communication problems. Therefore, it is necessary to provide early diagnosis and timely treatment for HL. This study investigated the advantages and disadvantages of three classical machine learning methods: multilayer perceptron (MLP), support vector machine (SVM), and least-square support vector machine (LS-SVM) approach and made a further optimization of the LS-SVM model via wavelet entropy. The investigation illustrated that themultilayer perceptron is a shallowneural network,while the least square support vector machine uses hinge loss function… More >

  • Open Access

    ARTICLE

    Seasonal Characteristics Analysis and Uncertainty Measurement for Wind Speed Time Series

    Xing Deng1,2, Haijian Shao1,2,*, Xia Wang3,4

    Energy Engineering, Vol.117, No.5, pp. 289-299, 2020, DOI:10.32604/EE.2020.011126

    Abstract Wind speed’s distribution nature such as uncertainty and randomness imposes a challenge in high accuracy forecasting. Based on the energy distribution about the extracted amplitude and associated frequency, the uncertainty measurement is processed through Rényi entropy analysis method with time-frequency nature. Nonparametric statistical method is used to test the randomness of wind speed, more precisely, whether or not the wind speed time series is independent and identically distribution (i.i.d) based on the output probability. Seasonal characteristics of wind speed are analyzed based on self-similarity in periodogram under scales range generated by wavelet transformation to reasonably divide the original dataset and… More >

  • Open Access

    ARTICLE

    The Method for Extracting New Login Sentiment Words from Chinese Micro-Blog Basedf on Improved Mutual Information

    Guangli Zhu, Wenting Liu, Shunxiang Zhang*, Xiang Chen , Chang Yin

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 223-232, 2020, DOI:10.32604/csse.2020.35.223

    Abstract The current method of extracting new login sentiment words not only ignores the diversity of patterns constituted by new multi-character words (the number of words is greater than two), but also disregards the influence of other new words co-occurring with a new word connoting sentiment. To solve this problem, this paper proposes a method for extracting new login sentiment words from Chinese micro-blog based on improved mutual information. First, micro-blog data are preprocessed, taking into consideration some nonsense signals such as web links and punctuation. Based on preprocessed data, the candidate strings are obtained by applying the N-gram segmentation method.… More >

  • Open Access

    ARTICLE

    Ordering Method and Empirical Study on Multiple Factor Sensitivity of Group Social Attitudes Based on Entropy Theory

    Qin He1, Shuang Dong1,*, Yaxin Cheng1

    Computer Systems Science and Engineering, Vol.34, No.4, pp. 225-230, 2019, DOI:10.32604/csse.2019.34.225

    Abstract When studying the various factors affecting a group’s social attitudes, minor changes in a factor will easily cause changes to other factors due to their association and relevance to each other; therefore, such a factor is more sensitive, although there is a difference between sensitivity and importance. In order to comprehensively learn about the influence of multiple factors, explorations based on entropy theory have been conducted to determine the sensitivity of each factor, to specify the difference between the frequency and sensitivity priority of entropy theory, and to provide a method, a way of thinking, and a detailed basis for… More >

  • Open Access

    ARTICLE

    Modeling and Analysis of Leftover Issues and Release Time Planning in Multi-Release Open Source Software Using Entropy Based Measure

    Meera Sharma1, H. Pham2, V.B. Singh3

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 33-46, 2019, DOI:10.32604/csse.2019.34.033

    Abstract In Open Source Software (OSS), users report different issues on issues tracking systems. Due to time constraint, it is not possible for developers to resolve all the issues in the current release. The leftover issues which are not addressed in the current release are added in the next release issue content. Fixing of issues result in code changes that can be quantified with a measure known as complexity of code changes or entropy. We have developed a 2-dimensional entropy based mathematical model to determine the leftover issues of different releases of five Apache open source products. A model for release… More >

  • Open Access

    ARTICLE

    Design of Intelligent English Translation Algorithms Based on a Fuzzy Semantic Network

    Ping Wang1 HongGuo Cai2,*, LuKun Wang3

    Intelligent Automation & Soft Computing, Vol.26, No.3, pp. 519-529, 2020, DOI:10.32604/iasc.2020.013929

    Abstract In order to improve the quality of intelligent English translation, an intelligent English translation algorithm based on the fuzzy semantic network is designed. By calculating the distance of fuzzy semantic network, classifying and ordering the English semantics to determine the optimal similarity and outputting the optimal translation results, the experiments show the average BLEU and NIST of the three test sets are 25.85 and 5.8925 respectively. The translation accuracy is higher than 95%. The algorithm can translate 246 Chinese sentences per second. This shows it is a high-performance intelligent translation algorithm and can be applied to practical intelligent translation software. More >

  • Open Access

    ARTICLE

    Second Law Analysis and Optimization of Elliptical Pin Fin Heat Sinks Using Firefly Algorithm

    Nawaf N. Hamadneh1, Waqar A. Khan2, Ilyas Khan3, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1015-1032, 2020, DOI:10.32604/cmc.2020.011476

    Abstract One of the most significant considerations in the design of a heat sink is thermal management due to increasing thermal flux and miniature in size. These heat sinks utilize plate or pin fins depending upon the required heat dissipation rate. They are designed to optimize overall performance. Elliptical pin fin heat sinks enhance heat transfer rates and reduce the pumping power. In this study, the Firefly Algorithm is implemented to optimize heat sinks with elliptical pin-fins. The pin-fins are arranged in an inline fashion. The natureinspired metaheuristic algorithm performs powerfully and efficiently in solving numerical global optimization problems. Based on… More >

  • Open Access

    ARTICLE

    C5.0 Decision Tree Model Using Tsallis Entropy and Association Function for General and Medical Dataset

    Uma K.V1,*, Appavu alias Balamurugan S2

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 61-70, 2020, DOI:10.31209/2019.100000153

    Abstract Real world data consists of lot of impurities. Entropy measure will help to handle impurities in a better way. Here, data selection is done by using Naïve Bayes’ theorem. The sample which has posterior probability value greater than that of the threshold value is selected. C5.0 decision tree classifier is taken as base and modified the Gain calculation function using Tsallis entropy and Association function. The proposed classifier model provides more accuracy and smaller tree for general and Medical dataset. Precision value obtained for Medical dataset is more than that of existing method. More >

  • Open Access

    ARTICLE

    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing method is deployed in this… More >

Displaying 101-110 on page 11 of 122. Per Page