Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (106)
  • Open Access

    ARTICLE

    Structural Damage Identification System Suitable for Old Arch Bridge in Rural Regions: Random Forest Approach

    Yu Zhang, Zhihua Xiong*, Zhuoxi Liang, Jiachen She, Chicheng Ma

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 447-469, 2023, DOI:10.32604/cmes.2023.022699

    Abstract A huge number of old arch bridges located in rural regions are at the peak of maintenance. The health monitoring technology of the long-span bridge is hardly applicable to the small-span bridge, owing to the absence of technical resources and sufficient funds in rural regions. There is an urgent need for an economical, fast, and accurate damage identification solution. The authors proposed a damage identification system of an old arch bridge implemented with a machine learning algorithm, which took the vehicle-induced response as the excitation. A damage index was defined based on wavelet packet theory, and a machine learning sample… More >

  • Open Access

    ARTICLE

    Multi Class Brain Cancer Prediction System Empowered with BRISK Descriptor

    Madona B. Sahaai*, G. R. Jothilakshmi, E. Praveen, V. Hemath Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1507-1521, 2023, DOI:10.32604/iasc.2023.032256

    Abstract Magnetic Resonance Imaging (MRI) is one of the important resources for identifying abnormalities in the human brain. This work proposes an effective Multi-Class Classification (MCC) system using Binary Robust Invariant Scalable Keypoints (BRISK) as texture descriptors for effective classification. At first, the potential Region Of Interests (ROIs) are detected using features from the accelerated segment test algorithm. Then, non-maxima suppression is employed in scale space based on the information in the ROIs. The discriminating power of BRISK is examined using three machine learning classifiers such as k-Nearest Neighbour (kNN), Support Vector Machine (SVM) and Random Forest (RF). An MCC system… More >

  • Open Access

    ARTICLE

    Parkinson’s Disease Classification Using Random Forest Kerb Feature Selection

    E. Bharath1,*, T. Rajagopalan2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1417-1433, 2023, DOI:10.32604/iasc.2023.032102

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease cause by a deficiency of dopamine. Investigators have identified the voice as the underlying symptom of PD. Advanced vocal disorder studies provide adequate treatment and support for accurate PD detection. Machine learning (ML) models have recently helped to solve problems in the classification of chronic diseases. This work aims to analyze the effect of selecting features on ML efficiency on a voice-based PD detection system. It includes PD classification models of Random forest, decision Tree, neural network, logistic regression and support vector machine. The feature selection is made by RF mean-decrease in accuracy… More >

  • Open Access

    ARTICLE

    Smart Techniques for LULC Micro Class Classification Using Landsat8 Imagery

    Mutiullah Jamil1, Hafeez ul Rehman1, SaleemUllah1, Imran Ashraf2,*, Saqib Ubaid1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5545-5557, 2023, DOI:10.32604/cmc.2023.033449

    Abstract Wheat species play important role in the price of products and wheat production estimation. There are several mathematical models used for the estimation of the wheat crop but these models are implemented without considering the wheat species which is an important independent variable. The task of wheat species identification is challenging both for human experts as well as for computer vision-based solutions. With the use of satellite remote sensing, it is possible to identify and monitor wheat species on a large scale at any stage of the crop life cycle. In this work, nine popular wheat species are identified by… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease

    Meshal Alharbi, Shabana R. Ziyad*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5483-5505, 2023, DOI:10.32604/cmc.2023.032341

    Abstract Aging is a natural process that leads to debility, disease, and dependency. Alzheimer’s disease (AD) causes degeneration of the brain cells leading to cognitive decline and memory loss, as well as dependence on others to fulfill basic daily needs. AD is the major cause of dementia. Computer-aided diagnosis (CADx) tools aid medical practitioners in accurately identifying diseases such as AD in patients. This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop (IWD) algorithm and the Random Forest (RF) classifier. The IWD algorithm an efficient feature selection method, was used to… More >

  • Open Access

    ARTICLE

    Research on Early Warning of Customer Churn Based on Random Forest

    Zizhen Qin, Yuxin Liu, Tianze Zhang*

    Journal on Artificial Intelligence, Vol.4, No.3, pp. 143-154, 2022, DOI:10.32604/jai.2022.031843

    Abstract With the rapid development of interest rate market and big data, the banking industry has shown the obvious phenomenon of “two or eight law”, 20% of the high quality customers occupy most of the bank’s assets, how to prevent the loss of bank credit card customers has become a growing concern for banks. Therefore, it is particularly important to establish a customer churn early warning model. In this paper, we will use the random forest method to establish a customer churn early warning model, focusing on the churn of bank credit card customers and predicting the possibility of future churn… More >

  • Open Access

    ARTICLE

    A Two-Step Algorithm to Estimate Variable Importance for Multi-State Data: An Application to COVID-19

    Behnaz Alafchi1, Leili Tapak1,*, Hassan Doosti2, Christophe Chesneau3, Ghodratollah Roshanaei1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2047-2064, 2023, DOI:10.32604/cmes.2022.022647

    Abstract Survival data with a multi-state structure are frequently observed in follow-up studies. An analytic approach based on a multi-state model (MSM) should be used in longitudinal health studies in which a patient experiences a sequence of clinical progression events. One main objective in the MSM framework is variable selection, where attempts are made to identify the risk factors associated with the transition hazard rates or probabilities of disease progression. The usual variable selection methods, including stepwise and penalized methods, do not provide information about the importance of variables. In this context, we present a two-step algorithm to evaluate the importance… More >

  • Open Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669

    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats targeting privacy information and sensitive… More >

  • Open Access

    ARTICLE

    Investigation of Single and Multiple Mutations Prediction Using Binary Classification Approach

    T. Edwin Ponraj1,*, J. Charles2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1189-1203, 2023, DOI:10.32604/iasc.2023.033383

    Abstract The mutation is a critical element in determining the proteins’ stability, becoming a core element in portraying the effects of a drug in the pharmaceutical industry. Doing wet laboratory tests to provide a better perspective on protein mutations is expensive and time-intensive since there are so many potential mutations, computational approaches that can reliably anticipate the consequences of amino acid mutations are critical. This work presents a robust methodology to analyze and identify the effects of mutation on a single protein structure. Initially, the context in a collection of words is determined using a knowledge graph for feature selection purposes.… More >

Displaying 31-40 on page 4 of 106. Per Page