Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (107)
  • Open Access

    ARTICLE

    Analysis of the Lost Circulation Problem

    Xingquan Zhang1, Renjun Xie1, Kuan Liu2,*, Yating Li2, Yuqiang Xu2,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1721-1733, 2023, DOI:10.32604/fdmp.2023.025578 - 30 January 2023

    Abstract The well-known “lost circulation” problem refers to the uncontrolled flow of whole mud into a formation. In order to address the problem related to the paucity of available data, in the present study, a model is introduced for the lost-circulation risk sample profile of a drilled well. The model is built taking into account effective data (the Block L). Then, using a three-dimensional geological modeling software, relying on the variation function and sequential Gaussian simulation method, a three-dimensional block lost-circulation risk model is introduced able to provide relevant information for regional analyses. More >

  • Open Access

    ARTICLE

    Micro Calcification Detection in Mammogram Images Using Contiguous Convolutional Neural Network Algorithm

    P. Gomathi1,*, C. Muniraj2, P. S. Periasamy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1887-1899, 2023, DOI:10.32604/csse.2023.028808 - 03 November 2022

    Abstract The mortality rate decreases as the early detection of Breast Cancer (BC) methods are emerging very fast, and when the starting stage of BC is detected, it is curable. The early detection of the disease depends on the image processing techniques, and it is used to identify the disease easily and accurately, especially the micro calcifications are visible on mammography when they are 0.1 mm or bigger, and cancer cells are about 0.03 mm, which is crucial for identifying in the BC area. To achieve this micro calcification in the BC images, it is necessary… More >

  • Open Access

    ARTICLE

    Stacking Ensemble Learning-Based Convolutional Gated Recurrent Neural Network for Diabetes Miletus

    G. Geetha1,2,*, K. Mohana Prasad1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 703-718, 2023, DOI:10.32604/iasc.2023.032530 - 29 September 2022

    Abstract Diabetes mellitus is a metabolic disease in which blood glucose levels rise as a result of pancreatic insulin production failure. It causes hyperglycemia and chronic multiorgan dysfunction, including blindness, renal failure, and cardiovascular disease, if left untreated. One of the essential checks that are needed to be performed frequently in Type 1 Diabetes Mellitus is a blood test, this procedure involves extracting blood quite frequently, which leads to subject discomfort increasing the possibility of infection when the procedure is often recurring. Existing methods used for diabetes classification have less classification accuracy and suffer from vanishing… More >

  • Open Access

    ARTICLE

    Robust Frequency Estimation Under Additive Symmetric α-Stable Gaussian Mixture Noise

    Peng Wang1, Yulu Tian2, Bolong Men1,*, Hailong Song1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 83-95, 2023, DOI:10.32604/iasc.2023.027602 - 29 September 2022

    Abstract Here the estimating problem of a single sinusoidal signal in the additive symmetric α-stable Gaussian (ASαSG) noise is investigated. The ASαSG noise here is expressed as the additive of a Gaussian noise and a symmetric α-stable distributed variable. As the probability density function (PDF) of the ASαSG is complicated, traditional estimators cannot provide optimum estimates. Based on the Metropolis-Hastings (M-H) sampling scheme, a robust frequency estimator is proposed for ASαSG noise. Moreover, to accelerate the convergence rate of the developed algorithm, a new criterion of reconstructing the proposal covariance is derived, whose main idea is More >

  • Open Access

    ARTICLE

    Real and Altered Fingerprint Classification Based on Various Features and Classifiers

    Saif Saad Hameed, Ismail Taha Ahmed*, Omar Munthir Al Okashi

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 327-340, 2023, DOI:10.32604/cmc.2023.031622 - 22 September 2022

    Abstract Biometric recognition refers to the identification of individuals through their unique behavioral features (e.g., fingerprint, face, and iris). We need distinguishing characteristics to identify people, such as fingerprints, which are world-renowned as the most reliable method to identify people. The recognition of fingerprints has become a standard procedure in forensics, and different techniques are available for this purpose. Most current techniques lack interest in image enhancement and rely on high-dimensional features to generate classification models. Therefore, we proposed an effective fingerprint classification method for classifying the fingerprint image as authentic or altered since criminals and… More >

  • Open Access

    ARTICLE

    Data Mining Approach Based on Hierarchical Gaussian Mixture Representation Model

    Hanan A. Hosni Mahmoud1,*, Alaaeldin M. Hafez2, Fahd Althukair3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3727-3741, 2023, DOI:10.32604/iasc.2023.031442 - 17 August 2022

    Abstract Infinite Gaussian mixture process is a model that computes the Gaussian mixture parameters with order. This process is a probability density distribution with adequate training data that can converge to the input density curve. In this paper, we propose a data mining model namely Beta hierarchical distribution that can solve axial data modeling. A novel hierarchical Two-Hyper-Parameter Poisson stochastic process is developed to solve grouped data modelling. The solution uses data mining techniques to link datum in groups by linking their components. The learning techniques are novel presentations of Gaussian modelling that use prior knowledge More >

  • Open Access

    ARTICLE

    Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning

    Christy James Jose1,*, M. S. Rajasree2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1357-1372, 2023, DOI:10.32604/csse.2023.025672 - 15 June 2022

    Abstract The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like, fingerprint or face. Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’ identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session. However, divergent issues remain unaddressed. This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called, Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s… More >

  • Open Access

    ARTICLE

    Gaussian PI Controller Network Classifier for Grid-Connected Renewable Energy System

    Ravi Samikannu1,*, K. Vinoth2, Narasimha Rao Dasari3, Senthil Kumar Subburaj4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 983-995, 2023, DOI:10.32604/iasc.2023.026069 - 06 June 2022

    Abstract Multi-port converters are considered as exceeding earlier period decade owing to function in a combination of different energy sources in a single processing unit. Renewable energy sources are playing a significant role in the modern energy system with rapid development. In renewable sources like fuel combustion and solar energy, the generated voltages change due to their environmental changes. To develop energy resources, electric power generation involved huge awareness. The power and output voltages are plays important role in our work but it not considered in the existing system. For considering the power and voltage, Gaussian… More >

  • Open Access

    ARTICLE

    Hybrid Convolutional Neural Network and Long Short-Term Memory Approach for Facial Expression Recognition

    M. N. Kavitha1,*, A. RajivKannan2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 689-704, 2023, DOI:10.32604/iasc.2023.025437 - 06 June 2022

    Abstract Facial Expression Recognition (FER) has been an important field of research for several decades. Extraction of emotional characteristics is crucial to FERs, but is complex to process as they have significant intra-class variances. Facial characteristics have not been completely explored in static pictures. Previous studies used Convolution Neural Networks (CNNs) based on transfer learning and hyperparameter optimizations for static facial emotional recognitions. Particle Swarm Optimizations (PSOs) have also been used for tuning hyperparameters. However, these methods achieve about 92 percent in terms of accuracy. The existing algorithms have issues with FER accuracy and precision. Hence,… More >

  • Open Access

    ARTICLE

    A Network Traffic Prediction Algorithm Based on Prophet-EALSTM-GPR

    Guoqing Xu1, Changsen Xia1, Jun Qian1, Guo Ran3, Zilong Jin1,2,*

    Journal on Internet of Things, Vol.4, No.2, pp. 113-125, 2022, DOI:10.32604/jiot.2022.036066 - 28 March 2023

    Abstract Huge networks and increasing network traffic will consume more and more resources. It is critical to predict network traffic accurately and timely for network planning, and resource allocation, etc. In this paper, a combined network traffic prediction model is proposed, which is based on Prophet, evolutionary attention-based LSTM (EALSTM) network, and Gaussian process regression (GPR). According to the non-smooth, sudden, periodic, and long correlation characteristics of network traffic, the prediction procedure is divided into three steps to predict network traffic accurately. In the first step, the Prophet model decomposes network traffic data into periodic and More >

Displaying 41-50 on page 5 of 107. Per Page