Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Analysis of Additional Damping Control Strategy and Parameter Optimization for Improving Small Signal Stability of VSC-HVDC System

    Hui Fang1, Jingsen Zhou1, Hanjie Liu2,*, Yanxu Wang2, Hongji Xiang1, Yechun Xin2

    Energy Engineering, Vol.120, No.4, pp. 931-948, 2023, DOI:10.32604/ee.2023.025163

    Abstract The voltage source converter based high voltage direct current (VSC-HVDC) system is based on voltage source converter, and its control system is more complex. Also affected by the fast control of power electronics, oscillation phenomenon in wide frequency domain may occur. To address the problem of small signal stability of the VSC-HVDC system, a converter control strategy is designed to improve its small signal stability, and the risk of system oscillation is reduced by attaching a damping controller and optimizing the control parameters. Based on the modeling of the VSC-HVDC system, the general architecture of the inner and outer loop… More >

  • Open Access

    ARTICLE

    Earthworm Optimization with Improved SqueezeNet Enabled Facial Expression Recognition Model

    N. Sharmili1, Saud Yonbawi2, Sultan Alahmari3, E. Laxmi Lydia4, Mohamad Khairi Ishak5, Hend Khalid Alkahtani6,*, Ayman Aljarbouh7, Samih M. Mostafa8

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2247-2262, 2023, DOI:10.32604/csse.2023.036377

    Abstract Facial expression recognition (FER) remains a hot research area among computer vision researchers and still becomes a challenge because of high intra-class variations. Conventional techniques for this problem depend on hand-crafted features, namely, LBP, SIFT, and HOG, along with that a classifier trained on a database of videos or images. Many execute perform well on image datasets captured in a controlled condition; however not perform well in the more challenging dataset, which has partial faces and image variation. Recently, many studies presented an endwise structure for facial expression recognition by utilizing DL methods. Therefore, this study develops an earthworm optimization… More >

  • Open Access

    ARTICLE

    Intelligent Modulation Recognition of Communication Signal for Next-Generation 6G Networks

    Mrim M. Alnfiai*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5723-5740, 2023, DOI:10.32604/cmc.2023.033408

    Abstract In recent years, the need for a fast, efficient and a reliable wireless network has increased dramatically. Numerous 5G networks have already been tested while a few are in the early stages of deployment. In non-cooperative communication scenarios, the recognition of digital signal modulations assists people in identifying the communication targets and ensures an effective management over them. The recent advancements in both Machine Learning (ML) and Deep Learning (DL) models demand the development of effective modulation recognition models with self-learning capability. In this background, the current research article designs a Deep Learning enabled Intelligent Modulation Recognition of Communication Signal… More >

  • Open Access

    ARTICLE

    Optimal Structural Parameters for a Plastic Centrifugal Pump Inducer

    Wenbin Luo1,*, Lingfeng Tang1, Yuting Yan2, Yifang Shi1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.4, pp. 869-899, 2023, DOI:10.32604/fdmp.2022.022280

    Abstract The aim of the study is to determine the optimal structural parameters for a plastic centrifugal pump inducer within the framework of an orthogonal experimental method. For this purpose, a numerical study of the related flow field is performed using CFX. The shaft power and the head of the pump are taken as the evaluation indicators. Accordingly, the examined variables are the thickness (S), the blade cascade degree (t), the blade rim angle (β1), the blade hub angle (β2) and the hub length (L). The impact of each structural parameter on each evaluation index is examined and special attention is… More >

  • Open Access

    ARTICLE

    A Hyperparameter Optimization for Galaxy Classification

    Fatih Ahmet Şenel*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4587-4600, 2023, DOI:10.32604/cmc.2023.033155

    Abstract In this study, the morphological galaxy classification process was carried out with a hybrid approach. Since the Galaxy classification process may contain detailed information about the universe’s formation, it remains the current research topic. Researchers divided more than 100 billion galaxies into ten different classes. It is not always possible to understand which class the galaxy types belong. However, Artificial Intelligence (AI) can be used for successful classification. There are studies on the automatic classification of galaxies into a small number of classes. As the number of classes increases, the success of the used methods decreases. Based on the literature,… More >

  • Open Access

    ARTICLE

    Optimal Deep Transfer Learning Based Colorectal Cancer Detection and Classification Model

    Mahmoud Ragab1,2,3,*, Maged Mostafa Mahmoud4,5,6, Amer H. Asseri2,7, Hani Choudhry2,7, Haitham A. Yacoub8

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3279-3295, 2023, DOI:10.32604/cmc.2023.031037

    Abstract Colorectal carcinoma (CRC) is one such dispersed cancer globally and also prominent one in causing cancer-based death. Conventionally, pathologists execute CRC diagnosis through visible scrutinizing under the microscope the resected tissue samples, stained and fixed through Haematoxylin and Eosin (H&E). The advancement of graphical processing systems has resulted in high potentiality for deep learning (DL) techniques in interpretating visual anatomy from high resolution medical images. This study develops a slime mould algorithm with deep transfer learning enabled colorectal cancer detection and classification (SMADTL-CCDC) algorithm. The presented SMADTL-CCDC technique intends to appropriately recognize the occurrence of colorectal cancer. To accomplish this,… More >

  • Open Access

    ARTICLE

    Effective Return Rate Prediction of Blockchain Financial Products Using Machine Learning

    K. Kalyani1, Velmurugan Subbiah Parvathy2, Hikmat A. M. Abdeljaber3, T. Satyanarayana Murthy4, Srijana Acharya5, Gyanendra Prasad Joshi6, Sung Won Kim7,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2303-2316, 2023, DOI:10.32604/cmc.2023.033162

    Abstract In recent times, financial globalization has drastically increased in different ways to improve the quality of services with advanced resources. The successful applications of bitcoin Blockchain (BC) techniques enable the stockholders to worry about the return and risk of financial products. The stockholders focused on the prediction of return rate and risk rate of financial products. Therefore, an automatic return rate bitcoin prediction model becomes essential for BC financial products. The newly designed machine learning (ML) and deep learning (DL) approaches pave the way for return rate predictive method. This study introduces a novel Jellyfish search optimization based extreme learning… More >

  • Open Access

    ARTICLE

    Jellyfish Search Optimization with Deep Learning Driven Autism Spectrum Disorder Classification

    S. Rama Sree1, Inderjeet Kaur2, Alexey Tikhonov3, E. Laxmi Lydia4, Ahmed A. Thabit5, Zahraa H. Kareem6, Yousif Kerrar Yousif7, Ahmed Alkhayyat8,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 2195-2209, 2023, DOI:10.32604/cmc.2023.032586

    Abstract Autism spectrum disorder (ASD) is regarded as a neurological disorder well-defined by a specific set of problems associated with social skills, recurrent conduct, and communication. Identifying ASD as soon as possible is favourable due to prior identification of ASD permits prompt interferences in children with ASD. Recognition of ASD related to objective pathogenic mutation screening is the initial step against prior intervention and efficient treatment of children who were affected. Nowadays, healthcare and machine learning (ML) industries are combined for determining the existence of various diseases. This article devises a Jellyfish Search Optimization with Deep Learning Driven ASD Detection and… More >

  • Open Access

    ARTICLE

    Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment

    Fadwa Alrowais1, Sami Althahabi2, Saud S. Alotaibi3, Abdullah Mohamed4, Manar Ahmed Hamza5,*, Radwa Marzouk6

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 687-700, 2023, DOI:10.32604/csse.2023.030188

    Abstract Recently, Internet of Things (IoT) devices produces massive quantity of data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where the existence of cyber threats needs to be resolved. The development of automated tools for cyber threat detection and classification using machine learning (ML) and artificial intelligence (AI) tools become essential to accomplish security in the IoT environment. It is needed to minimize security issues related to IoT gadgets effectively. Therefore, this article introduces a new Mayfly optimization (MFO) with regularized extreme learning machine (RELM) model, named MFO-RELM for Cybersecurity… More >

  • Open Access

    ARTICLE

    Hunger Search Optimization with Hybrid Deep Learning Enabled Phishing Detection and Classification Model

    Hadil Shaiba1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Radwa Marzouk4, Heba Mohsen5, Manar Ahmed Hamza6,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6425-6441, 2022, DOI:10.32604/cmc.2022.031625

    Abstract Phishing is one of the simplest ways in cybercrime to hack the reliable data of users such as passwords, account identifiers, bank details, etc. In general, these kinds of cyberattacks are made at users through phone calls, emails, or instant messages. The anti-phishing techniques, currently under use, are mainly based on source code features that need to scrape the webpage content. In third party services, these techniques check the classification procedure of phishing Uniform Resource Locators (URLs). Even though Machine Learning (ML) techniques have been lately utilized in the identification of phishing, they still need to undergo feature engineering since… More >

Displaying 11-20 on page 2 of 43. Per Page