Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (801)
  • Open Access

    ARTICLE

    Identification of Software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features

    Qazi Mazhar ul Haq1, Fahim Arif2,3, Khursheed Aurangzeb4, Noor ul Ain3, Javed Ali Khan5, Saddaf Rubab6, Muhammad Shahid Anwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4379-4397, 2024, DOI:10.32604/cmc.2024.047172

    Abstract Software project outcomes heavily depend on natural language requirements, often causing diverse interpretations and issues like ambiguities and incomplete or faulty requirements. Researchers are exploring machine learning to predict software bugs, but a more precise and general approach is needed. Accurate bug prediction is crucial for software evolution and user training, prompting an investigation into deep and ensemble learning methods. However, these studies are not generalized and efficient when extended to other datasets. Therefore, this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification problems. The methods involved feature selection, which is used to… More >

  • Open Access

    ARTICLE

    Machine-Learning Based Packet Switching Method for Providing Stable High-Quality Video Streaming in Multi-Stream Transmission

    Yumin Jo1, Jongho Paik2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4153-4176, 2024, DOI:10.32604/cmc.2024.047046

    Abstract Broadcasting gateway equipment generally uses a method of simply switching to a spare input stream when a failure occurs in a main input stream. However, when the transmission environment is unstable, problems such as reduction in the lifespan of equipment due to frequent switching and interruption, delay, and stoppage of services may occur. Therefore, applying a machine learning (ML) method, which is possible to automatically judge and classify network-related service anomaly, and switch multi-input signals without dropping or changing signals by predicting or quickly determining the time of error occurrence for smooth stream switching when there are problems such as… More >

  • Open Access

    ARTICLE

    Design of Artificial Intelligence Companion Chatbot

    Xiaoying Chen1,*, Jie Kang1, Cong Hu2

    Journal of New Media, Vol.6, pp. 1-16, 2024, DOI:10.32604/jnm.2024.045833

    Abstract With the development of cities and the prevalence of networks, interpersonal relationships have become increasingly distant. When people crave communication, they hope to find someone to confide in. With the rapid advancement of deep learning and big data technologies, an enabling environment has been established for the development of intelligent chatbot systems. By effectively combining cutting-edge technologies with human-centered design principles, chatbots hold the potential to revolutionize our lives and alleviate feelings of loneliness. A multi-topic chat companion robot based on a state machine has been proposed, which can engage in fluent dialogue with humans and meet different functional requirements.… More >

  • Open Access

    ARTICLE

    A Real-Time Localization Algorithm for Unmanned Aerial Vehicle Based on Continuous Images Processing

    Peng Geng1,*, Annan Yang2, Yan Liu3

    Journal on Artificial Intelligence, Vol.6, pp. 43-52, 2024, DOI:10.32604/jai.2024.047642

    Abstract This article presents a real-time localization method for Unmanned Aerial Vehicles (UAVs) based on continuous image processing. The proposed method employs the Scale Invariant Feature Transform (SIFT) algorithm to identify key points in multi-scale space and generate descriptor vectors to match identical objects across multiple images. These corresponding points in the image provide pixel positions, which can be combined with transformation equations, allow for the calculation of the UAV’s actual ground position. Additionally, the physical coordinates of matching points in the image can be obtained, corresponding to the UAV’s physical coordinates. The method achieves real-time positioning and tracking during UAV… More >

  • Open Access

    ARTICLE

    Design of a Multi-Stage Ensemble Model for Thyroid Prediction Using Learning Approaches

    M. L. Maruthi Prasad*, R. Santhosh

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 1-13, 2024, DOI:10.32604/iasc.2023.036628

    Abstract This research concentrates to model an efficient thyroid prediction approach, which is considered a baseline for significant problems faced by the women community. The major research problem is the lack of automated model to attain earlier prediction. Some existing model fails to give better prediction accuracy. Here, a novel clinical decision support system is framed to make the proper decision during a time of complexity. Multiple stages are followed in the proposed framework, which plays a substantial role in thyroid prediction. These steps include i) data acquisition, ii) outlier prediction, and iii) multi-stage weight-based ensemble learning process (MS-WEL). The weighted… More >

  • Open Access

    ARTICLE

    Study on Image Recognition Algorithm for Residual Snow and Ice on Photovoltaic Modules

    Yongcan Zhu1,2, Jiawen Wang1, Ye Zhang1,2, Long Zhao1, Botao Jiang1, Xinbo Huang1,*

    Energy Engineering, Vol.121, No.4, pp. 895-911, 2024, DOI:10.32604/ee.2023.041002

    Abstract The accumulation of snow and ice on PV modules can have a detrimental impact on power generation, leading to reduced efficiency for prolonged periods. Thus, it becomes imperative to develop an intelligent system capable of accurately assessing the extent of snow and ice coverage on PV modules. To address this issue, the article proposes an innovative ice and snow recognition algorithm that effectively segments the ice and snow areas within the collected images. Furthermore, the algorithm incorporates an analysis of the morphological characteristics of ice and snow coverage on PV modules, allowing for the establishment of a residual ice and… More >

  • Open Access

    ARTICLE

    Investigation of FRP and SFRC Technologies for Efficient Tunnel Reinforcement Using the Cohesive Zone Model

    Gang Niu1,2, Zhaoyang Jin2, Wei Zhang3,*, Yiqun Huang3

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 161-179, 2024, DOI:10.32604/sdhm.2023.044580

    Abstract Amid urbanization and the continuous expansion of transportation networks, the necessity for tunnel construction and maintenance has become paramount. Addressing this need requires the investigation of efficient, economical, and robust tunnel reinforcement techniques. This paper explores fiber reinforced polymer (FRP) and steel fiber reinforced concrete (SFRC) technologies, which have emerged as viable solutions for enhancing tunnel structures. FRP is celebrated for its lightweight and high-strength attributes, effectively augmenting load-bearing capacity and seismic resistance, while SFRC’s notable crack resistance and longevity potentially enhance the performance of tunnel segments. Nonetheless, current research predominantly focuses on experimental analysis, lacking comprehensive theoretical models. To… More > Graphic Abstract

    Investigation of FRP and SFRC Technologies for Efficient Tunnel Reinforcement Using the Cohesive Zone Model

  • Open Access

    ARTICLE

    Classification and clustering of buildings for understanding urban dynamics

    A framework for processing spatiotemporal data

    Perez Joan1, Fusco Giovanni1, Sadahiro Yukio2

    Revue Internationale de Géomatique, Vol.31, No.2, pp. 303-327, 2022, DOI:10.3166/RIG.31.303-327© 2022

    Abstract This paper presents different methods implemented with the aim of studying urban dynamics at the building level. Building types are identified within a comprehensive vector-based building inventory, spanning over at least two time points. First, basic morphometric indicators are computed for each building: area, floor-area, number of neighbors, elongation, and convexity. Based on the availability of expert knowledge, different types of classification and clustering are performed: supervised tree-like classificatory model, expert-constrained k-means and combined SOM-HCA. A grid is superimposed on the test region of Osaka (Japan) and the number of building types per cell and for each period is computed,… More >

  • Open Access

    ARTICLE

    NUMERICAL SIMULATION OF DROPLET IMPACT AND SOLIDIFICATION INCLUDING THERMAL SHRINKAGE IN A THERMAL SPRAY PROCESS

    Sina Alavi, Mohammad Passandideh-Fard*

    Frontiers in Heat and Mass Transfer, Vol.2, No.2, pp. 1-9, 2011, DOI:10.5098/hmt.v2.2.3007

    Abstract In this paper, a numerical study is performed to investigate the effects of thermal shrinkage on the deposition of molten particles on a substrate in a thermal spray process using the Volume-of-Fluid (VOF) method. Thermal shrinkage is a phenomenon caused by the variation of density during cooling and solidification of a molten metal. The Navier-Stokes equations along with the energy equation including phase change are solved using a 2D/axisymmetric mesh. The VOF method is used to track the free surface of molten particles, and an enthalpy-porosity formulation is used to model solidification. For the normal impact of tin particles in… More >

  • Open Access

    ARTICLE

    A Novel Intrusion Detection Model of Unknown Attacks Using Convolutional Neural Networks

    Abdullah Alsaleh1,2,*

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 431-449, 2024, DOI:10.32604/csse.2023.043107

    Abstract With the increasing number of connected devices in the Internet of Things (IoT) era, the number of intrusions is also increasing. An intrusion detection system (IDS) is a secondary intelligent system for monitoring, detecting and alerting against malicious activity. IDS is important in developing advanced security models. This study reviews the importance of various techniques, tools, and methods used in IoT detection and/or prevention systems. Specifically, it focuses on machine learning (ML) and deep learning (DL) techniques for IDS. This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles. To speed… More >

Displaying 11-20 on page 2 of 801. Per Page