Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

    Mustafa Sami Abdullatef*, Faten N. Alzubaidi, Anees Al-Tamimi, Yasser Ahmed Mahmood

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2083-2107, 2023, DOI:10.32604/fdmp.2023.027266

    Abstract The ongoing effort to create methods for detecting and quantifying fatigue damage is motivated by the high levels of uncertainty in present fatigue-life prediction approaches and the frequently catastrophic nature of fatigue failure. The fatigue life of high strength aluminum alloy 2090-T83 is predicted in this study using a variety of artificial intelligence and machine learning techniques for constant amplitude and negative stress ratios (). Artificial neural networks (ANN), adaptive neuro-fuzzy inference systems (ANFIS), support-vector machines (SVM), a random forest model (RF), and an extreme-gradient tree-boosting model (XGB) are trained using numerical and experimental input data obtained from fatigue tests… More > Graphic Abstract

    Fatigue Life Estimation of High Strength 2090-T83 Aluminum Alloy under Pure Torsion Loading Using Various Machine Learning Techniques

  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One of the online security challenges… More >

  • Open Access

    REVIEW

    A Review of Machine Learning Techniques in Cyberbullying Detection

    Daniyar Sultan1,2,*, Batyrkhan Omarov3, Zhazira Kozhamkulova4, Gulnur Kazbekova5, Laura Alimzhanova1, Aigul Dautbayeva6, Yernar Zholdassov1, Rustam Abdrakhmanov3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5625-5640, 2023, DOI:10.32604/cmc.2023.033682

    Abstract Automatic identification of cyberbullying is a problem that is gaining traction, especially in the Machine Learning areas. Not only is it complicated, but it has also become a pressing necessity, considering how social media has become an integral part of adolescents’ lives and how serious the impacts of cyberbullying and online harassment can be, particularly among teenagers. This paper contains a systematic literature review of modern strategies, machine learning methods, and technical means for detecting cyberbullying and the aggressive command of an individual in the information space of the Internet. We undertake an in-depth review of 13 papers from four… More >

  • Open Access

    ARTICLE

    AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique

    Liaqat Ali1, Saif E. A. Alnawayseh2, Mohammed Salahat3, Taher M. Ghazal4,5,*, Mohsen A. A. Tomh6, Beenu Mago7

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1095-1104, 2023, DOI:10.32604/iasc.2023.031335

    Abstract The immediate international spread of severe acute respiratory syndrome revealed the potential threat of infectious diseases in a closely integrated and interdependent world. When an outbreak occurs, each country must have a well-coordinated and preventative plan to address the situation. Information and Communication Technologies have provided innovative approaches to dealing with numerous facets of daily living. Although intelligent devices and applications have become a vital part of our everyday lives, smart gadgets have also led to several physical and psychological health problems in modern society. Here, we used an artificial intelligence AI-based system for disease prediction using an Artificial Neural… More >

  • Open Access

    REVIEW

    Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions

    Gulshan Kumar1,*, Hamed Alqahtani2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 89-119, 2023, DOI:10.32604/cmes.2022.020724

    Abstract Software-Defined Networking (SDN) enables flexibility in developing security tools that can effectively and efficiently analyze and detect malicious network traffic for detecting intrusions. Recently Machine Learning (ML) techniques have attracted lots of attention from researchers and industry for developing intrusion detection systems (IDSs) considering logically centralized control and global view of the network provided by SDN. Many IDSs have developed using advances in machine learning and deep learning. This study presents a comprehensive review of recent work of ML-based IDS in context to SDN. It presents a comprehensive study of the existing review papers in the field. It is followed… More >

  • Open Access

    ARTICLE

    Rock Strength Estimation Using Several Tree-Based ML Techniques

    Zida Liu1, Danial Jahed Armaghani2,*, Pouyan Fakharian3, Diyuan Li4, Dmitrii Vladimirovich Ulrikh5, Natalia Nikolaevna Orekhova6, Khaled Mohamed Khedher7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 799-824, 2022, DOI:10.32604/cmes.2022.021165

    Abstract The uniaxial compressive strength (UCS) of rock is an essential property of rock material in different relevant applications, such as rock slope, tunnel construction, and foundation. It takes enormous time and effort to obtain the UCS values directly in the laboratory. Accordingly, an indirect determination of UCS through conducting several rock index tests that are easy and fast to carry out is of interest and importance. This study presents powerful boosting trees evaluation framework, i.e., adaptive boosting machine, extreme gradient boosting machine (XGBoost), and category gradient boosting machine, for estimating the UCS of sandstone. Schmidt hammer rebound number, P-wave velocity,… More >

  • Open Access

    ARTICLE

    Comparative Analysis Using Machine Learning Techniques for Fine Grain Sentiments

    Zeeshan Ahmad1, Waqas Haider Bangyal1, Kashif Nisar2,3,*, Muhammad Reazul Haque4, M. Adil Khan5

    Journal on Artificial Intelligence, Vol.4, No.1, pp. 49-60, 2022, DOI:10.32604/jai.2022.017992

    Abstract Huge amount of data is being produced every second for microblogs, different content sharing sites, and social networking. Sentimental classification is a tool that is frequently used to identify underlying opinions and sentiments present in the text and classifying them. It is widely used for social media platforms to find user's sentiments about a particular topic or product. Capturing, assembling, and analyzing sentiments has been challenge for researchers. To handle these challenges, we present a comparative sentiment analysis study in which we used the fine-grained Stanford Sentiment Treebank (SST) dataset, based on 215,154 exclusive texts of different lengths that are… More >

  • Open Access

    ARTICLE

    Practical Machine Learning Techniques for COVID-19 Detection Using Chest X-Ray Images

    Yurananatul Mangalmurti, Naruemon Wattanapongsakorn*

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 733-752, 2022, DOI:10.32604/iasc.2022.025073

    Abstract This paper presents effective techniques for automatic detection/classification of COVID-19 and other lung diseases using machine learning, including deep learning with convolutional neural networks (CNN) and classical machine learning techniques. We had access to a large number of chest X-ray images to use as input data. The data contains various categories including COVID-19, Pneumonia, Pneumothorax, Atelectasis, and Normal (without disease). In addition, chest X-ray images with many findings (abnormalities and diseases) from the National Institutes of Health (NIH) was also considered. Our deep learning approach used a CNN architecture with VGG16 and VGG19 models which were pre-trained with ImageNet. We… More >

  • Open Access

    ARTICLE

    Heart Disease Diagnosis Using the Brute Force Algorithm and Machine Learning Techniques

    Junaid Rashid1, Samina Kanwal2, Jungeun Kim1,*, Muhammad Wasif Nisar2, Usman Naseem3, Amir Hussain4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3195-3211, 2022, DOI:10.32604/cmc.2022.026064

    Abstract Heart disease is one of the leading causes of death in the world today. Prediction of heart disease is a prominent topic in the clinical data processing. To increase patient survival rates, early diagnosis of heart disease is an important field of research in the medical field. There are many studies on the prediction of heart disease, but limited work is done on the selection of features. The selection of features is one of the best techniques for the diagnosis of heart diseases. In this research paper, we find optimal features using the brute-force algorithm, and machine learning techniques are… More >

  • Open Access

    ARTICLE

    Evaluating the Clogging Behavior of Pervious Concrete (PC) Using the Machine Learning Techniques

    Jiandong Huang1, Jia Zhang1, Yuan Gao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 805-821, 2022, DOI:10.32604/cmes.2022.017792

    Abstract

    Pervious concrete (PC) is at risk of clogging due to the continuous blockage of sand into it during its service time. This study aims to evaluate and predict such clogging behavior of PC using hybrid machine learning techniques. Based on the 84 groups of the dataset developed in the earlier study, the clogging behavior of the PC was determined by the algorithm combing the SVM (support vector machines) and particle swarm optimization (PSO) methods. The PSO algorithm was employed to adjust the hyperparameters of the SVM and verify the performance using 10-fold cross-validation. The predicting results of the developed model… More >

Displaying 11-20 on page 2 of 33. Per Page