Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Predicting the Thickness of an Excavation Damaged Zone around the Roadway Using the DA-RF Hybrid Model

    Yuxin Chen1, Weixun Yong1, Chuanqi Li2, Jian Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2507-2526, 2023, DOI:10.32604/cmes.2023.025714 - 09 March 2023

    Abstract After the excavation of the roadway, the original stress balance is destroyed, resulting in the redistribution of stress and the formation of an excavation damaged zone (EDZ) around the roadway. The thickness of EDZ is the key basis for roadway stability discrimination and support structure design, and it is of great engineering significance to accurately predict the thickness of EDZ. Considering the advantages of machine learning (ML) in dealing with high-dimensional, nonlinear problems, a hybrid prediction model based on the random forest (RF) algorithm is developed in this paper. The model used the dragonfly algorithm… More >

  • Open Access

    ARTICLE

    Estimation of Weibull Distribution Parameters for Wind Speed Characteristics Using Neural Network Algorithm

    Musaed Alrashidi*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1073-1088, 2023, DOI:10.32604/cmc.2023.036170 - 06 February 2023

    Abstract Harvesting the power coming from the wind provides a green and environmentally friendly approach to producing electricity. To facilitate the ongoing advancement in wind energy applications, deep knowledge about wind regime behavior is essential. Wind speed is typically characterized by a statistical distribution, and the two-parameters Weibull distribution has shown its ability to represent wind speeds worldwide. Estimation of Weibull parameters, namely scale and shape parameters, is vital to describe the observed wind speeds data accurately. Yet, it is still a challenging task. Several numerical estimation approaches have been used by researchers to obtain c and… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic

    Reem Alkanhel1, El-Sayed M. El-kenawy2,3, D. L. Elsheweikh4, Abdelaziz A. Abdelhamid5,6, Abdelhameed Ibrahim7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 427-442, 2023, DOI:10.32604/cmc.2023.032885 - 06 February 2023

    Abstract Traffic prediction of wireless networks attracted many researchers and practitioners during the past decades. However, wireless traffic frequently exhibits strong nonlinearities and complicated patterns, which makes it challenging to be predicted accurately. Many of the existing approaches for predicting wireless network traffic are unable to produce accurate predictions because they lack the ability to describe the dynamic spatial-temporal correlations of wireless network traffic data. In this paper, we proposed a novel meta-heuristic optimization approach based on fitness grey wolf and dipper throated optimization algorithms for boosting the prediction accuracy of traffic volume. The proposed algorithm More >

  • Open Access

    ARTICLE

    Selective Mapping Scheme for Universal Filtered Multicarrier

    Akku Madhusudhan*, Sudhir Kumar Sharma

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1273-1282, 2023, DOI:10.32604/iasc.2023.030765 - 05 January 2023

    Abstract The next step in mobile communication technology, known as 5G, is set to go live in a number of countries in the near future. New wireless applications have high data rates and mobility requirements, which have posed a challenge to mobile communication technology researchers and designers. 5G systems could benefit from the Universal Filtered Multicarrier (UFMC). UFMC is an alternate waveform to orthogonal frequency-division multiplexing (OFDM), in filtering process is performed for a sub-band of subcarriers rather than the entire band of subcarriers Inter Carrier Interference (ICI) between neighbouring users is reduced via the sub-band More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513 - 31 October 2022

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

    Reem Alkanhel1, El-Sayed M. El-kenawy2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Manal Abdullah Alohali6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2677-2693, 2023, DOI:10.32604/cmc.2023.033273 - 31 October 2022

    Abstract Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization Through Deep Learning Classification of COVID-19 in Chest X-Ray Images

    Nagwan Abdel Samee1, El-Sayed M. El-Kenawy2,3, Ghada Atteia1,*, Mona M. Jamjoom4, Abdelhameed Ibrahim5, Abdelaziz A. Abdelhamid6,7, Noha E. El-Attar8, Tarek Gaber9,10, Adam Slowik11, Mahmoud Y. Shams12

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4193-4210, 2022, DOI:10.32604/cmc.2022.031147 - 16 June 2022

    Abstract As corona virus disease (COVID-19) is still an ongoing global outbreak, countries around the world continue to take precautions and measures to control the spread of the pandemic. Because of the excessive number of infected patients and the resulting deficiency of testing kits in hospitals, a rapid, reliable, and automatic detection of COVID-19 is in extreme need to curb the number of infections. By analyzing the COVID-19 chest X-ray images, a novel metaheuristic approach is proposed based on hybrid dipper throated and particle swarm optimizers. The lung region was segmented from the original chest X-ray… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization for Mobile Robot Navigation Based on Path Planning

    El-Sayed M. El-kenawy1,2, Zeeshan Shafi Khan3,*, Abdelhameed Ibrahim4, Bandar Abdullah Aloyaydi5, Hesham Arafat Ali2,4, Ali E. Takieldeen2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2241-2255, 2022, DOI:10.32604/cmc.2022.026672 - 16 June 2022

    Abstract Recently, the path planning problem may be considered one of the most interesting researched topics in autonomous robotics. That is why finding a safe path in a cluttered environment for a mobile robot is a significant requisite. A promising route planning for mobile robots on one side saves time and, on the other side, reduces the wear and tear on the robot, saving the capital investment. Numerous route planning methods for the mobile robot have been developed and applied. According to our best knowledge, no method offers an optimum solution among the existing methods. Particle… More >

  • Open Access

    ARTICLE

    Modeling Metaheuristic Optimization with Deep Learning Software Bug Prediction Model

    M. Sangeetha1,*, S. Malathi2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1587-1601, 2022, DOI:10.32604/iasc.2022.025192 - 25 May 2022

    Abstract Software testing is an effective means of verifying software stability and trustworthiness. It is essential in the software development process and needs a huge quantity of resources such as labor, money, and time. Automated software testing can be used to save manual work, shorten testing times, and improve testing performance. Recently, Software Bug Prediction (SBP) models have been developed to improve the software quality assurance (SQA) process through the prediction of bug parts. Advanced deep learning (DL) models can be used to classify faults in software parts. Because hyperparameters have a significant impact on the… More >

  • Open Access

    ARTICLE

    Dipper Throated Optimization Algorithm for Unconstrained Function and Feature Selection

    Ali E. Takieldeen1, El-Sayed M. El-kenawy1,2, Mohammed Hadwan3,4,5,*, Rokaia M. Zaki6,7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1465-1481, 2022, DOI:10.32604/cmc.2022.026026 - 24 February 2022

    Abstract Dipper throated optimization (DTO) algorithm is a novel with a very efficient metaheuristic inspired by the dipper throated bird. DTO has its unique hunting technique by performing rapid bowing movements. To show the efficiency of the proposed algorithm, DTO is tested and compared to the algorithms of Particle Swarm Optimization (PSO), Whale Optimization Algorithm (WOA), Grey Wolf Optimizer (GWO), and Genetic Algorithm (GA) based on the seven unimodal benchmark functions. Then, ANOVA and Wilcoxon rank-sum tests are performed to confirm the effectiveness of the DTO compared to other optimization techniques. Additionally, to demonstrate the proposed More >

Displaying 11-20 on page 2 of 26. Per Page