Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (212)
  • Open Access

    ARTICLE

    Extraction et mise en contexte spatial des propositions relatives au transport dans le Grand Débat National

    Jacques Fize1, Lucile Sautot2, Martin Lentschat3, Laurence Dujourdy4, Ludovic Journaux5, Mohamed Hilal6

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 329-354, 2022, DOI:10.3166/RIG.31.329-354© 2022

    Abstract The Great National Debate, launched by Emmanuel Macron in early 2019 to respond to the “Gilets jaunes” social movement, allowed the collection of citizens’ contributions on the ecological transition via an online platform. In this article, we use the corpus constituted by these contributions to identify locations where participants are asking for the development of bicycle paths and railway facilities. For this purpose, we have created a classification model to identify answers related to the theme of transportation and proposed a method for extracting contributions that reflect the contributors’ proposals. We then sought to explain the observed spatial frequency of… More >

  • Open Access

    ARTICLE

    Binary Program Vulnerability Mining Based on Neural Network

    Zhenhui Li1, Shuangping Xing1, Lin Yu1, Huiping Li1, Fan Zhou1, Guangqiang Yin1, Xikai Tang2, Zhiguo Wang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1861-1879, 2024, DOI:10.32604/cmc.2023.046595

    Abstract Software security analysts typically only have access to the executable program and cannot directly access the source code of the program. This poses significant challenges to security analysis. While it is crucial to identify vulnerabilities in such non-source code programs, there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods. However, these tools suffer from some shortcomings. In terms of targeted fuzzing, the path searching for target points is not streamlined enough, and the completely random testing leads to an excessively large search space. Additionally, when it comes to code similarity analysis,… More >

  • Open Access

    ARTICLE

    A Predictive Energy Management Strategies for Mining Dump Trucks

    Yixuan Yu, Yulin Wang*, Qingcheng Li, Bowen Jiao

    Energy Engineering, Vol.121, No.3, pp. 769-788, 2024, DOI:10.32604/ee.2023.044042

    Abstract The plug-in hybrid vehicles (PHEV) technology can effectively address the issues of poor dynamics and higher energy consumption commonly found in traditional mining dump trucks. Meanwhile, plug-in hybrid electric trucks can achieve excellent fuel economy through efficient energy management strategies (EMS). Therefore, a series hybrid system is constructed based on a 100-ton mining dump truck in this paper. And inspired by the dynamic programming (DP) algorithm, a predictive equivalent consumption minimization strategy (P-ECMS) based on the DP optimization result is proposed. Based on the optimal control manifold and the SOC reference trajectory obtained by the DP algorithm, the P-ECMS strategy… More >

  • Open Access

    ARTICLE

    Opinion Mining on Movie Reviews Based on Deep Learning Models

    Mian Muhammad Danyal1, Muhammad Haseeb1, Sarwar Shah Khan2,*, Bilal Khan1, Subhan Ullah1

    Journal on Artificial Intelligence, Vol.6, pp. 23-42, 2024, DOI:10.32604/jai.2023.045617

    Abstract Movies reviews provide valuable insights that can help people decide which movies are worth watching and avoid wasting their time on movies they will not enjoy. Movie reviews may contain spoilers or reveal significant plot details, which can reduce the enjoyment of the movie for those who have not watched it yet. Additionally, the abundance of reviews may make it difficult for people to read them all at once, classifying all of the movie reviews will help in making this decision without wasting time reading them all. Opinion mining, also called sentiment analysis, is the process of identifying and extracting… More >

  • Open Access

    ARTICLE

    Multiple-Object Tracking Using Histogram Stamp Extraction in CCTV Environments

    Ye-Yeon Kang1, Geon Park1, Hyun Yoo2, Kyungyong Chung1,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3619-3635, 2023, DOI:10.32604/cmc.2023.043566

    Abstract Object tracking, an important technology in the field of image processing and computer vision, is used to continuously track a specific object or person in an image. This technology may be effective in identifying the same person within one image, but it has limitations in handling multiple images owing to the difficulty in identifying whether the object appearing in other images is the same. When tracking the same object using two or more images, there must be a way to determine that objects existing in different images are the same object. Therefore, this paper attempts to determine the same object… More >

  • Open Access

    ARTICLE

    Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering

    Fady Samann1,*, Shavan Askar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2421-2444, 2024, DOI:10.32604/cmes.2023.031265

    Abstract Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms. K-clustering algorithms are simplistic, with fast performance and relative accuracy. However, their implementation depends on the initial selection of clusters number (K), the initial clusters’ centers, and the clustering metric. This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time (LET) as a clustering metric. Realistic traffic flows were considered for three maps, namely Highway, Traffic Light junction, and Roundabout junction, to study the effect of road layout on… More >

  • Open Access

    ARTICLE

    DETERMINING HEAT TRANSFER COEFFICIENT OF HUMAN BODY

    A. Najjaran*, Ak. Najjaran, A. Fotoohabadi, A.R. Shiri

    Frontiers in Heat and Mass Transfer, Vol.4, No.1, pp. 1-5, 2013, DOI:10.5098/hmt.v4.1.3003

    Abstract In this paper, the aim is obtaining convection coefficient of human body. This field of study is essential in study of ventilation systems, astronauts’ clothes and any other fields in which human body is the main concern. At first a 3D human body has been designed by unstructured grids. Feet and hands are stretched completely in considered sample. Two postures (standing and supine) are considered for body. Soles and the back of entire body are considered in contact with the ground respectively in these postures. Other parts of human body are exposed to surrounding air. The heat transfer and the… More >

  • Open Access

    ARTICLE

    A Deep Learning Based Sentiment Analytic Model for the Prediction of Traffic Accidents

    Nadeem Malik1,*, Saud Altaf1, Muhammad Usman Tariq2, Ashir Ahmed3, Muhammad Babar4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1599-1615, 2023, DOI:10.32604/cmc.2023.040455

    Abstract The severity of traffic accidents is a serious global concern, particularly in developing nations. Knowing the main causes and contributing circumstances may reduce the severity of traffic accidents. There exist many machine learning models and decision support systems to predict road accidents by using datasets from different social media forums such as Twitter, blogs and Facebook. Although such approaches are popular, there exists an issue of data management and low prediction accuracy. This article presented a deep learning-based sentiment analytic model known as Extra-large Network Bi-directional long short term memory (XLNet-Bi-LSTM) to predict traffic collisions based on data collected from… More >

  • Open Access

    ARTICLE

    Analysis of Tourism Demand Difference Based on Data Mining and Intelligent Analysis

    Peng Cheng1,2,*

    Journal on Big Data, Vol.5, pp. 69-84, 2023, DOI:10.32604/jbd.2023.046294

    Abstract To serve as a reference for future foreign tourism study, relevant tourist sectors have done in-depth investigations on foreign tourism both domestically and internationally. A study of outbound tourism activities from the viewpoint of tourists can examine its development law and create successful marketing tactics based on the rise in the number of foreign tourists. Based on this, this study suggests a data mining technique to examine the variations in travel needs and marketing tactics among various consumer groups. The combined example analysis demonstrates how logical and useful our data mining analysis is. Our data tests demonstrate that the tourism… More >

  • Open Access

    ARTICLE

    A Novel Method for Determining Tourism Carrying Capacity in a Decision-Making Context Using q−Rung Orthopair Fuzzy Hypersoft Environment

    Salma Khan1, Muhammad Gulistan1, Nasreen Kausar2, Seifedine Kadry3,4,5, Jungeun Kim6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1951-1979, 2024, DOI:10.32604/cmes.2023.030896

    Abstract Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons, including leisure, pleasure, or business. A recent study has proposed a unique mathematical concept called a q−Rung orthopair fuzzy hypersoft set (ROFHS) to enhance the formal representation of human thought processes and evaluate tourism carrying capacity. This approach can capture the imprecision and ambiguity often present in human perception. With the advanced mathematical tools in this field, the study has also incorporated the Einstein aggregation operator and score function into the ROFHS values to support multi-attribute decision-making algorithms. By implementing… More >

Displaying 1-10 on page 1 of 212. Per Page