Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Enhancing Cancer Classification through a Hybrid Bio-Inspired Evolutionary Algorithm for Biomarker Gene Selection

    Hala AlShamlan*, Halah AlMazrua*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 675-694, 2024, DOI:10.32604/cmc.2024.048146

    Abstract In this study, our aim is to address the problem of gene selection by proposing a hybrid bio-inspired evolutionary algorithm that combines Grey Wolf Optimization (GWO) with Harris Hawks Optimization (HHO) for feature selection. The motivation for utilizing GWO and HHO stems from their bio-inspired nature and their demonstrated success in optimization problems. We aim to leverage the strengths of these algorithms to enhance the effectiveness of feature selection in microarray-based cancer classification. We selected leave-one-out cross-validation (LOOCV) to evaluate the performance of both two widely used classifiers, k-nearest neighbors (KNN) and support vector machine (SVM), on high-dimensional cancer microarray… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

    Song Wang1,*, Fei Xie1, Fengye Yang1, Shengxuan Qiu1, Chuang Liu2, Tong Li3

    Energy Engineering, Vol.120, No.10, pp. 2273-2285, 2023, DOI:10.32604/ee.2023.030107

    Abstract Winding is one of the most important components in power transformers. Ensuring the health state of the winding is of great importance to the stable operation of the power system. To efficiently and accurately diagnose the disc space variation (DSV) fault degree of transformer winding, this paper presents a diagnostic method of winding fault based on the K-Nearest Neighbor (KNN) algorithm and the frequency response analysis (FRA) method. First, a laboratory winding model is used, and DSV faults with four different degrees are achieved by changing disc space of the discs in the winding. Then, a series of FRA tests… More > Graphic Abstract

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

  • Open Access

    ARTICLE

    Research on Narrowband Line Spectrum Noise Control Method Based on Nearest Neighbor Filter and BP Neural Network Feedback Mechanism

    Shuiping Zhang1,2, Xi Liang3, Lin Shi2, Lei Yan4, Jun Tang1,2,*

    Sound & Vibration, Vol.57, pp. 29-44, 2023, DOI:10.32604/sv.2023.041350

    Abstract The filter-x least mean square (FxLMS) algorithm is widely used in active noise control (ANC) systems. However, because the algorithm is a feedback control algorithm based on the minimization of the error signal variance to update the filter coefficients, it has a certain delay, usually has a slow convergence speed, and the system response time is long and easily affected by the learning rate leading to the lack of system stability, which often fails to achieve the desired control effect in practice. In this paper, we propose an active control algorithm with nearest-neighbor trap structure and neural network feedback mechanism… More > Graphic Abstract

    Research on Narrowband Line Spectrum Noise Control Method Based on Nearest Neighbor Filter and BP Neural Network Feedback Mechanism

  • Open Access

    ARTICLE

    Accurate Machine Learning Predictions of Sci-Fi Film Performance

    Amjed Al Fahoum1,*, Tahani A. Ghobon2

    Journal of New Media, Vol.5, No.1, pp. 1-22, 2023, DOI:10.32604/jnm.2023.037583

    Abstract A groundbreaking method is introduced to leverage machine learning algorithms to revolutionize the prediction of success rates for science fiction films. In the captivating world of the film industry, extensive research and accurate forecasting are vital to anticipating a movie’s triumph prior to its debut. Our study aims to harness the power of available data to estimate a film’s early success rate. With the vast resources offered by the internet, we can access a plethora of movie-related information, including actors, directors, critic reviews, user reviews, ratings, writers, budgets, genres, Facebook likes, YouTube views for movie trailers, and Twitter followers. The… More >

  • Open Access

    ARTICLE

    Contrastive Clustering for Unsupervised Recognition of Interference Signals

    Xiangwei Chen1, Zhijin Zhao1,2,*, Xueyi Ye1, Shilian Zheng2, Caiyi Lou2, Xiaoniu Yang2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1385-1400, 2023, DOI:10.32604/csse.2023.034543

    Abstract Interference signals recognition plays an important role in anti-jamming communication. With the development of deep learning, many supervised interference signals recognition algorithms based on deep learning have emerged recently and show better performance than traditional recognition algorithms. However, there is no unsupervised interference signals recognition algorithm at present. In this paper, an unsupervised interference signals recognition method called double phases and double dimensions contrastive clustering (DDCC) is proposed. Specifically, in the first phase, four data augmentation strategies for interference signals are used in data-augmentation-based (DA-based) contrastive learning. In the second phase, the original dataset’s k-nearest neighbor set (KNNset) is designed… More >

  • Open Access

    ARTICLE

    Short Term Traffic Flow Prediction Using Hybrid Deep Learning

    Mohandu Anjaneyulu, Mohan Kubendiran*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1641-1656, 2023, DOI:10.32604/cmc.2023.035056

    Abstract Traffic flow prediction in urban areas is essential in the Intelligent Transportation System (ITS). Short Term Traffic Flow (STTF) prediction impacts traffic flow series, where an estimation of the number of vehicles will appear during the next instance of time per hour. Precise STTF is critical in Intelligent Transportation System. Various extinct systems aim for short-term traffic forecasts, ensuring a good precision outcome which was a significant task over the past few years. The main objective of this paper is to propose a new model to predict STTF for every hour of a day. In this paper, we have proposed… More >

  • Open Access

    ARTICLE

    Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture

    Usman Ahmad1, Muhammad Junaid Ali2, Faizan Ahmed Khan3, Arfat Ahmad Khan4, Arif Ur Rehman1, Malik Muhammad Ali Shahid5, Mohd Anul Haq6,*, Ilyas Khan7, Zamil S. Alzamil6, Ahmed Alhussen8

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2125-2140, 2023, DOI:10.32604/csse.2023.031008

    Abstract Building an automatic fish recognition and detection system for large-scale fish classes is helpful for marine researchers and marine scientists because there are large numbers of fish species. However, it is quite difficult to build such systems owing to the lack of data imbalance problems and large number of classes. To solve these issues, we propose a transfer learning-based technique in which we use Efficient-Net, which is pre-trained on ImageNet dataset and fine-tuned on QuT Fish Database, which is a large scale dataset. Furthermore, prior to the activation layer, we use Global Average Pooling (GAP) instead of dense layer with… More >

  • Open Access

    ARTICLE

    A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor

    Monika Khandelwal1, Ranjeet Kumar Rout1, Saiyed Umer2, Kshira Sagar Sahoo3, NZ Jhanjhi4,*, Mohammad Shorfuzzaman5, Mehedi Masud5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3587-3598, 2023, DOI:10.32604/iasc.2023.029785

    Abstract Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. One of the problems observed in the fuzzification of an unknown pattern is that importance is given only to the known patterns but not to their features. In contrast, features of the patterns play an essential role when their respective patterns overlap. In this paper, an optimal fuzzy nearest neighbor model has been introduced in which a fuzzification process has been carried out for the unknown pattern using… More >

  • Open Access

    ARTICLE

    Fault Diagnosis in Robot Manipulators Using SVM and KNN

    D. Maincer1,*, Y. Benmahamed2, M. Mansour1, Mosleh Alharthi3, Sherif S. M. Ghonein3

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1957-1969, 2023, DOI:10.32604/iasc.2023.029210

    Abstract In this paper, Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) based methods are to be applied on fault diagnosis in a robot manipulator. A comparative study between the two classifiers in terms of successfully detecting and isolating the seven classes of sensor faults is considered in this work. For both classifiers, the torque, the position and the speed of the manipulator have been employed as the input vector. However, it is to mention that a large database is needed and used for the training and testing phases. The SVM method used in this paper is based on the Gaussian… More >

Displaying 1-10 on page 1 of 28. Per Page