Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (126)
  • Open Access

    ARTICLE

    A New Approach for the Calculation of Slope Failure Probability with Fuzzy Limit-State Functions

    Jianing Hao1, Dan Yang2, Guanxiong Ren1, Ying Zhao3, Rangling Cao4,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.1, pp. 141-159, 2025, DOI:10.32604/fdmp.2024.054469 - 24 January 2025

    Abstract This study presents an innovative approach to calculating the failure probability of slopes by incorporating fuzzy limit-state functions, a method that significantly enhances the accuracy and efficiency of slope stability analysis. Unlike traditional probabilistic techniques, this approach utilizes a least squares support vector machine (LSSVM) optimized with a grey wolf optimizer (GWO) and K-fold cross-validation (CV) to approximate the limit-state function, thus reducing computational complexity. The novelty of this work lies in its application to one-dimensional (1D), two-dimensional (2D), and three-dimensional (3D) slope models, demonstrating its versatility and high precision. The proposed method consistently achieves… More > Graphic Abstract

    A New Approach for the Calculation of Slope Failure Probability with Fuzzy Limit-State Functions

  • Open Access

    ARTICLE

    5DGWO-GAN: A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems

    Sarvenaz Sadat Khatami1, Mehrdad Shoeibi2, Anita Ershadi Oskouei3, Diego Martín4,*, Maral Keramat Dashliboroun5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 881-911, 2025, DOI:10.32604/cmc.2024.059999 - 03 January 2025

    Abstract The Internet of Things (IoT) is integral to modern infrastructure, enabling connectivity among a wide range of devices from home automation to industrial control systems. With the exponential increase in data generated by these interconnected devices, robust anomaly detection mechanisms are essential. Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns. This paper presents a novel approach utilizing generative adversarial networks (GANs) for anomaly detection in IoT systems. However, optimizing GANs involves tuning hyper-parameters such as learning rate, batch size, and optimization algorithms,… More >

  • Open Access

    ARTICLE

    Collaborative Trajectory Planning for Stereoscopic Agricultural Multi-UAVs Driven by the Aquila Optimizer

    Xinyu Liu#, Longfei Wang#, Yuxin Ma, Peng Shao*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1349-1376, 2025, DOI:10.32604/cmc.2024.058294 - 03 January 2025

    Abstract Stereoscopic agriculture, as an advanced method of agricultural production, poses new challenges for multi-task trajectory planning of unmanned aerial vehicles (UAVs). To address the need for UAVs to perform multi-task trajectory planning in stereoscopic agriculture, a multi-task trajectory planning model and algorithm (IEP-AO) that synthesizes flight safety and flight efficiency is proposed. Based on the requirements of stereoscopic agricultural geomorphological features and operational characteristics, the multi-task trajectory planning model is ensured by constructing targeted constraints at five aspects, including the path, slope, altitude, corner, energy and obstacle threat, to improve the effectiveness of the trajectory… More >

  • Open Access

    ARTICLE

    Three-Stage Transfer Learning with AlexNet50 for MRI Image Multi-Class Classification with Optimal Learning Rate

    Suganya Athisayamani1, A. Robert Singh2, Gyanendra Prasad Joshi3, Woong Cho4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 155-183, 2025, DOI:10.32604/cmes.2024.056129 - 17 December 2024

    Abstract In radiology, magnetic resonance imaging (MRI) is an essential diagnostic tool that provides detailed images of a patient’s anatomical and physiological structures. MRI is particularly effective for detecting soft tissue anomalies. Traditionally, radiologists manually interpret these images, which can be labor-intensive and time-consuming due to the vast amount of data. To address this challenge, machine learning, and deep learning approaches can be utilized to improve the accuracy and efficiency of anomaly detection in MRI scans. This manuscript presents the use of the Deep AlexNet50 model for MRI classification with discriminative learning methods. There are three… More >

  • Open Access

    ARTICLE

    Research on Grid-Connected Control Strategy of Distributed Generator Based on Improved Linear Active Disturbance Rejection Control

    Xin Mao*, Hongsheng Su, Jingxiu Li

    Energy Engineering, Vol.121, No.12, pp. 3929-3951, 2024, DOI:10.32604/ee.2024.057106 - 22 November 2024

    Abstract The virtual synchronous generator (VSG) technology has been proposed to address the problem of system frequency and active power oscillation caused by grid-connected new energy power sources. However, the traditional voltage-current double-closed-loop control used in VSG has the disadvantages of poor disturbance immunity and insufficient dynamic response. In light of the issues above, a virtual synchronous generator voltage outer-loop control strategy based on improved linear autonomous disturbance rejection control (ILADRC) is put forth for consideration. Firstly, an improved first-order linear self-immunity control structure is established for the characteristics of the voltage outer loop; then, the… More >

  • Open Access

    ARTICLE

    Enhanced Growth Optimizer and Its Application to Multispectral Image Fusion

    Jeng-Shyang Pan1,2, Wenda Li1, Shu-Chuan Chu1,*, Xiao Sui1, Junzo Watada3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3033-3062, 2024, DOI:10.32604/cmc.2024.056310 - 18 November 2024

    Abstract The growth optimizer (GO) is an innovative and robust metaheuristic optimization algorithm designed to simulate the learning and reflective processes experienced by individuals as they mature within the social environment. However, the original GO algorithm is constrained by two significant limitations: slow convergence and high memory requirements. This restricts its application to large-scale and complex problems. To address these problems, this paper proposes an innovative enhanced growth optimizer (eGO). In contrast to conventional population-based optimization algorithms, the eGO algorithm utilizes a probabilistic model, designated as the virtual population, which is capable of accurately replicating the… More >

  • Open Access

    ARTICLE

    African Bison Optimization Algorithm: A New Bio-Inspired Optimizer with Engineering Applications

    Jian Zhao1,2,*, Kang Wang1,2, Jiacun Wang3,*, Xiwang Guo4, Liang Qi5

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 603-623, 2024, DOI:10.32604/cmc.2024.050523 - 15 October 2024

    Abstract This paper introduces the African Bison Optimization (ABO) algorithm, which is based on biological population. ABO is inspired by the survival behaviors of the African bison, including foraging, bathing, jousting, mating, and eliminating. The foraging behavior prompts the bison to seek a richer food source for survival. When bison find a food source, they stick around for a while by bathing behavior. The jousting behavior makes bison stand out in the population, then the winner gets the chance to produce offspring in the mating behavior. The eliminating behavior causes the old or injured bison to More >

  • Open Access

    ARTICLE

    Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization

    Ahmad Yahiya Ahmad Bani Ahmad1, Jafar Alzubi2, Sophers James3, Vincent Omollo Nyangaresi4,5,*, Chanthirasekaran Kutralakani6, Anguraju Krishnan7

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4791-4812, 2024, DOI:10.32604/cmc.2024.052771 - 12 September 2024

    Abstract In recent years, wearable devices-based Human Activity Recognition (HAR) models have received significant attention. Previously developed HAR models use hand-crafted features to recognize human activities, leading to the extraction of basic features. The images captured by wearable sensors contain advanced features, allowing them to be analyzed by deep learning algorithms to enhance the detection and recognition of human actions. Poor lighting and limited sensor capabilities can impact data quality, making the recognition of human actions a challenging task. The unimodal-based HAR approaches are not suitable in a real-time environment. Therefore, an updated HAR model is… More >

  • Open Access

    ARTICLE

    Optimized Phishing Detection with Recurrent Neural Network and Whale Optimizer Algorithm

    Brij Bhooshan Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4895-4916, 2024, DOI:10.32604/cmc.2024.050815 - 12 September 2024

    Abstract Phishing attacks present a persistent and evolving threat in the cybersecurity land-scape, necessitating the development of more sophisticated detection methods. Traditional machine learning approaches to phishing detection have relied heavily on feature engineering and have often fallen short in adapting to the dynamically changing patterns of phishing Uniform Resource Locator (URLs). Addressing these challenge, we introduce a framework that integrates the sequential data processing strengths of a Recurrent Neural Network (RNN) with the hyperparameter optimization prowess of the Whale Optimization Algorithm (WOA). Our model capitalizes on an extensive Kaggle dataset, featuring over 11,000 URLs, each More >

  • Open Access

    ARTICLE

    Chase, Pounce, and Escape Optimization Algorithm

    Adel Sabry Eesa*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 697-723, 2024, DOI:10.32604/iasc.2024.053192 - 06 September 2024

    Abstract While many metaheuristic optimization algorithms strive to address optimization challenges, they often grapple with the delicate balance between exploration and exploitation, leading to issues such as premature convergence, sensitivity to parameter settings, and difficulty in maintaining population diversity. In response to these challenges, this study introduces the Chase, Pounce, and Escape (CPE) algorithm, drawing inspiration from predator-prey dynamics. Unlike traditional optimization approaches, the CPE algorithm divides the population into two groups, each independently exploring the search space to efficiently navigate complex problem domains and avoid local optima. By incorporating a unique search mechanism that integrates More >

Displaying 1-10 on page 1 of 126. Per Page