Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (273)
  • Open Access

    ARTICLE

    Optimal Reordering Trace Files for Improving Software Testing Suitcase

    Yingfu Cai1, Sultan Noman Qasem2,3, Harish Garg4, Hamïd Parvïn5,6,7,*, Kim-Hung Pho8, Zulkefli Mansor9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1225-1239, 2021, DOI:10.32604/cmc.2021.014699 - 12 January 2021

    Abstract An invariant can be described as an essential relationship between program variables. The invariants are very useful in software checking and verification. The tools that are used to detect invariants are invariant detectors. There are two types of invariant detectors: dynamic invariant detectors and static invariant detectors. Daikon software is an available computer program that implements a special case of a dynamic invariant detection algorithm. Daikon proposes a dynamic invariant detection algorithm based on several runs of the tested program; then, it gathers the values of its variables, and finally, it detects relationships between the… More >

  • Open Access

    ARTICLE

    Automatic Text Summarization Using Genetic Algorithm and Repetitive Patterns

    Ebrahim Heidary1, Hamïd Parvïn2,3,4,*, Samad Nejatian5,6, Karamollah Bagherifard1,6, Vahideh Rezaie6,7, Zulkefli Mansor8, Kim-Hung Pho9

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1085-1101, 2021, DOI:10.32604/cmc.2021.013836 - 12 January 2021

    Abstract Taking into account the increasing volume of text documents, automatic summarization is one of the important tools for quick and optimal utilization of such sources. Automatic summarization is a text compression process for producing a shorter document in order to quickly access the important goals and main features of the input document. In this study, a novel method is introduced for selective text summarization using the genetic algorithm and generation of repetitive patterns. One of the important features of the proposed summarization is to identify and extract the relationship between the main features of the… More >

  • Open Access

    ARTICLE

    A Negotiated Pricing Model for Innovation Services Based on the Multiobjective Genetic Algorithm

    Yan Zhou1,*, Yue Li1, Yunxing Zhang2

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 191-203, 2021, DOI:10.32604/iasc.2021.014142 - 07 January 2021

    Abstract Service pricing is a bottleneck in the development of innovation services, as it is the issue of most concern to the suppliers and demanders. In this paper, a negotiated pricing model that is based on the multiobjective genetic algorithm is developed for innovation services. Regarding the process of service pricing as a multiobjective problem, the objective functions which include the service price, service efficiency, and service quality for the suppliers and the demanders are constructed. Because the solution of a multiobjective problem is typically a series of alternatives, an additional negotiation process is necessary in More >

  • Open Access

    ARTICLE

    SDN Controller Allocation and Assignment Based on Multicriterion Chaotic Salp Swarm Algorithm

    Suresh Krishnamoorthy1,*, Kumaratharan Narayanaswamy2

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 89-102, 2021, DOI:10.32604/iasc.2021.013643 - 07 January 2021

    Abstract Increase in demand for multimedia and quality services requires 5G networks to resolve issues such as slicing, allocation, forwarding, and control using techniques such as software-defined networking (SDN) and network function virtualization. In this study, the optimum number of SDN multi-controllers are implemented based on a multi-criterion advanced genetic algorithm that takes into consideration three key parameters: Switch controller latency, hopcount, and link utilization. Preprocessing is the first step, in which delay, delay paths, hopcount, and hoppaths are computed as an information matrix (Infomat). Randomization is the second step, and consists of initially placing controllers… More >

  • Open Access

    ARTICLE

    Optimal Robust Control for Unstable Delay System

    Rihem Farkh1,2,*, Khaled A. Aljaloud1, Moufida Ksouri2, Faouzi Bouani2

    Computer Systems Science and Engineering, Vol.36, No.2, pp. 307-321, 2021, DOI:10.32604/csse.2021.014334 - 05 January 2021

    Abstract Proportional-Integral-Derivative control system has been widely used in industrial applications. For uncertain and unstable systems, tuning controller parameters to satisfy the process requirements is very challenging. In general, the whole system’s performance strongly depends on the controller’s efficiency and hence the tuning process plays a key role in the system’s response. This paper presents a robust optimal Proportional-Integral-Derivative controller design methodology for the control of unstable delay system with parametric uncertainty using a combination of Kharitonov theorem and genetic algorithm optimization based approaches. In this study, the Generalized Kharitonov Theorem (GKT) for quasi-polynomials is employed… More >

  • Open Access

    ARTICLE

    Motion-Based Activities Monitoring through Biometric Sensors Using Genetic Algorithm

    Mohammed Alshehri1,*, Purushottam Sharma2, Richa Sharma2, Osama Alfarraj3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2525-2538, 2021, DOI:10.32604/cmc.2021.012469 - 28 December 2020

    Abstract Sensors and physical activity evaluation are quite limited for motion-based commercial devices. Sometimes the accelerometer of the smartwatch is utilized; walking is investigated. The combination can perform better in terms of sensors and that can be determined by sensors on both the smartwatch and phones, i.e., accelerometer and gyroscope. For biometric efficiency, some of the diverse activities of daily routine have been evaluated, also with biometric authentication. The result shows that using the different computing techniques in phones and watch for biometric can provide a suitable output based on the mentioned activities. This indicates that… More >

  • Open Access

    ARTICLE

    Kriging Surrogate-Based Genetic Algorithm Optimization for Blade Design of a Horizontal Axis Wind Turbine

    Nantiwat Pholdee1, Sujin Bureerat1, Weerapon Nuantong2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 261-273, 2021, DOI:10.32604/cmes.2021.012349 - 22 December 2020

    Abstract Horizontal axis wind turbines are some of the most widely used clean energy generators in the world. Horizontal axis wind turbine blades need to be designed for optimization in order to maximize efficiency and simultaneously minimize the cost of energy. This work presents the optimization of new MEXICO blades for a horizontal axis wind turbine at the wind speed of 10 m/s. The optimization problem is posed to maximize the power coefficient while the design variables are twist angles on the blade radius and rotating axis positions on a chord length of the airfoils. Computational… More >

  • Open Access

    ARTICLE

    Urdu Ligature Recognition System: An Evolutionary Approach

    Naila Habib Khan1,*, Awais Adnan1, Abdul Waheed2,3, Mahdi Zareei4, Abdallah Aldosary5, Ehab Mahmoud Mohamed6,7

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1347-1367, 2021, DOI:10.32604/cmc.2020.013715 - 26 November 2020

    Abstract Cursive text recognition of Arabic script-based languages like Urdu is extremely complicated due to its diverse and complex characteristics. Evolutionary approaches like genetic algorithms have been used in the past for various optimization as well as pattern recognition tasks, reporting exceptional results. The proposed Urdu ligature recognition system uses a genetic algorithm for optimization and recognition. Overall the proposed recognition system observes the processes of pre-processing, segmentation, feature extraction, hierarchical clustering, classification rules and genetic algorithm optimization and recognition. The pre-processing stage removes noise from the sentence images, whereas, in segmentation, the sentences are segmented More >

  • Open Access

    ARTICLE

    Anomaly Classification Using Genetic Algorithm-Based Random Forest Model for Network Attack Detection

    Adel Assiri*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 767-778, 2021, DOI:10.32604/cmc.2020.013813 - 30 October 2020

    Abstract Anomaly classification based on network traffic features is an important task to monitor and detect network intrusion attacks. Network-based intrusion detection systems (NIDSs) using machine learning (ML) methods are effective tools for protecting network infrastructures and services from unpredictable and unseen attacks. Among several ML methods, random forest (RF) is a robust method that can be used in ML-based network intrusion detection solutions. However, the minimum number of instances for each split and the number of trees in the forest are two key parameters of RF that can affect classification accuracy. Therefore, optimal parameter selection… More >

  • Open Access

    ARTICLE

    Soft Computing Based Evolutionary Multi-Label Classification

    Rubina Aslam1,*, Manzoor Illahi Tamimy1, Waqar Aslam2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1233-1249, 2020, DOI:10.32604/iasc.2020.013086 - 24 December 2020

    Abstract Machine Learning (ML) has revolutionized intelligent systems that range from self-driving automobiles, search engines, business/market analysis, fraud detection, network intrusion investigation, and medical diagnosis. Classification lies at the core of Machine Learning and Multi-label Classification (MLC) is the closest to real-life problems related to heuristics. It is a type of classification problem where multiple labels or classes can be assigned to more than one instance simultaneously. The level of complexity in MLC is increased by factors such as data imbalance, high dimensionality, label correlations, and noise. Conventional MLC techniques such as ensembles-based approaches, Multi-label Stacking,… More >

Displaying 181-190 on page 19 of 273. Per Page