Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (837)
  • Open Access

    ARTICLE

    Sentiment Analysis Based on Performance of Linear Support Vector Machine and Multinomial Naïve Bayes Using Movie Reviews with Baseline Techniques

    Mian Muhammad Danyal1, Sarwar Shah Khan2,4, Muzammil Khan2,*, Muhammad Bilal Ghaffar1, Bilal Khan1, Muhammad Arshad3

    Journal on Big Data, Vol.5, pp. 1-18, 2023, DOI:10.32604/jbd.2023.041319

    Abstract Movies are the better source of entertainment. Every year, a great percentage of movies are released. People comment on movies in the form of reviews after watching them. Since it is difficult to read all of the reviews for a movie, summarizing all of the reviews will help make this decision without wasting time in reading all of the reviews. Opinion mining also known as sentiment analysis is the process of extracting subjective information from textual data. Opinion mining involves identifying and extracting the opinions of individuals, which can be positive, neutral, or negative. The task of opinion mining also… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Decision-Making Mechanism for Risk Assessment of Cardiovascular Disease

    Cheng Wang1, Haoran Zhu2,*, Congjun Rao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 691-718, 2024, DOI:10.32604/cmes.2023.029258

    Abstract Cardiovascular disease (CVD) has gradually become one of the main causes of harm to the life and health of residents. Exploring the influencing factors and risk assessment methods of CVD has become a general trend. In this paper, a machine learning-based decision-making mechanism for risk assessment of CVD is designed. In this mechanism, the logistics regression analysis method and factor analysis model are used to select age, obesity degree, blood pressure, blood fat, blood sugar, smoking status, drinking status, and exercise status as the main pathogenic factors of CVD, and an index system of risk assessment for CVD is established.… More >

  • Open Access

    ARTICLE

    A Degradation Type Adaptive and Deep CNN-Based Image Classification Model for Degraded Images

    Huanhua Liu, Wei Wang*, Hanyu Liu, Shuheng Yi, Yonghao Yu, Xunwen Yao

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 459-472, 2024, DOI:10.32604/cmes.2023.029084

    Abstract Deep Convolutional Neural Networks (CNNs) have achieved high accuracy in image classification tasks, however, most existing models are trained on high-quality images that are not subject to image degradation. In practice, images are often affected by various types of degradation which can significantly impact the performance of CNNs. In this work, we investigate the influence of image degradation on three typical image classification CNNs and propose a Degradation Type Adaptive Image Classification Model (DTA-ICM) to improve the existing CNNs’ classification accuracy on degraded images. The proposed DTA-ICM comprises two key components: a Degradation Type Predictor (DTP) and a Degradation Type… More >

  • Open Access

    REVIEW

    Review of Recent Trends in the Hybridisation of Preprocessing-Based and Parameter Optimisation-Based Hybrid Models to Forecast Univariate Streamflow

    Baydaa Abdul Kareem1,2, Salah L. Zubaidi2,3, Nadhir Al-Ansari4,*, Yousif Raad Muhsen2,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 1-41, 2024, DOI:10.32604/cmes.2023.027954

    Abstract Forecasting river flow is crucial for optimal planning, management, and sustainability using freshwater resources. Many machine learning (ML) approaches have been enhanced to improve streamflow prediction. Hybrid techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone approaches. Current researchers have also emphasised using hybrid models to improve forecast accuracy. Accordingly, this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years, summarising data preprocessing, univariate machine learning modelling strategy, advantages and disadvantages of standalone ML techniques, hybrid models, and performance… More > Graphic Abstract

    Review of Recent Trends in the Hybridisation of Preprocessing-Based and Parameter Optimisation-Based Hybrid Models to Forecast Univariate Streamflow

  • Open Access

    REVIEW

    Embracing the Future: AI and ML Transforming Urban Environments in Smart Cities

    Gagan Deep*, Jyoti Verma

    Journal on Artificial Intelligence, Vol.5, pp. 57-73, 2023, DOI:10.32604/jai.2023.043329

    Abstract This research explores the increasing importance of Artificial Intelligence (AI) and Machine Learning (ML) with relation to smart cities. It discusses the AI and ML’s ability to revolutionize various aspects of urban environments, including infrastructure, governance, public safety, and sustainability. The research presents the definition and characteristics of smart cities, highlighting the key components and technologies driving initiatives for smart cities. The methodology employed in this study involved a comprehensive review of relevant literature, research papers, and reports on the subject of AI and ML in smart cities. Various sources were consulted to gather information on the integration of AI… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been… More >

  • Open Access

    ARTICLE

    FIDS: Filtering-Based Intrusion Detection System for In-Vehicle CAN

    Seungmin Lee, Hyunghoon Kim, Haehyun Cho, Hyo Jin Jo*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2941-2954, 2023, DOI:10.32604/iasc.2023.039992

    Abstract Modern vehicles are equipped with multiple Electronic Control Units (ECUs) that support various convenient driving functions, such as the Advanced Driver Assistance System (ADAS). To enable communication between these ECUs, the Controller Area Network (CAN) protocol is widely used. However, since CAN lacks any security technologies, it is vulnerable to cyber attacks. To address this, researchers have conducted studies on machine learning-based intrusion detection systems (IDSs) for CAN. However, most existing IDSs still have non-negligible detection errors. In this paper, we propose a new filtering-based intrusion detection system (FIDS) to minimize the detection errors of machine learning-based IDSs. FIDS uses… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model

    Ahmed S. Almasoud*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2849-2863, 2023, DOI:10.32604/iasc.2023.039718

    Abstract The Internet of Things (IoT) is considered the next-gen connection network and is ubiquitous since it is based on the Internet. Intrusion Detection System (IDS) determines the intrusion performance of terminal equipment and IoT communication procedures from IoT environments after taking equivalent defence measures based on the identified behaviour. In this background, the current study develops an Enhanced Metaheuristics with Machine Learning enabled Cyberattack Detection and Classification (EMML-CADC) model in an IoT environment. The aim of the presented EMML-CADC model is to detect cyberattacks in IoT environments with enhanced efficiency. To attain this, the EMML-CADC model primarily employs a data… More >

  • Open Access

    ARTICLE

    SCADA Data-Based Support Vector Machine for False Alarm Identification for Wind Turbine Management

    Ana María Peco Chacón, Isaac Segovia Ramírez, Fausto Pedro García Márquez*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2595-2608, 2023, DOI:10.32604/iasc.2023.037277

    Abstract Maintenance operations have a critical influence on power generation by wind turbines (WT). Advanced algorithms must analyze large volume of data from condition monitoring systems (CMS) to determine the actual working conditions and avoid false alarms. This paper proposes different support vector machine (SVM) algorithms for the prediction and detection of false alarms. K-Fold cross-validation (CV) is applied to evaluate the classification reliability of these algorithms. Supervisory Control and Data Acquisition (SCADA) data from an operating WT are applied to test the proposed approach. The results from the quadratic SVM showed an accuracy rate of 98.6%. Misclassifications from the confusion… More >

  • Open Access

    ARTICLE

    AID4I: An Intrusion Detection Framework for Industrial Internet of Things Using Automated Machine Learning

    Anıl Sezgin1,2,*, Aytuğ Boyacı3

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2121-2143, 2023, DOI:10.32604/cmc.2023.040287

    Abstract By identifying and responding to any malicious behavior that could endanger the system, the Intrusion Detection System (IDS) is crucial for preserving the security of the Industrial Internet of Things (IIoT) network. The benefit of anomaly-based IDS is that they are able to recognize zero-day attacks due to the fact that they do not rely on a signature database to identify abnormal activity. In order to improve control over datasets and the process, this study proposes using an automated machine learning (AutoML) technique to automate the machine learning processes for IDS. Our ground-breaking architecture, known as AID4I, makes use of… More >

Displaying 1-10 on page 1 of 837. Per Page