Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (128)
  • Open Access

    ARTICLE

    Predicting the Thickness of an Excavation Damaged Zone around the Roadway Using the DA-RF Hybrid Model

    Yuxin Chen1, Weixun Yong1, Chuanqi Li2, Jian Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2507-2526, 2023, DOI:10.32604/cmes.2023.025714 - 09 March 2023

    Abstract After the excavation of the roadway, the original stress balance is destroyed, resulting in the redistribution of stress and the formation of an excavation damaged zone (EDZ) around the roadway. The thickness of EDZ is the key basis for roadway stability discrimination and support structure design, and it is of great engineering significance to accurately predict the thickness of EDZ. Considering the advantages of machine learning (ML) in dealing with high-dimensional, nonlinear problems, a hybrid prediction model based on the random forest (RF) algorithm is developed in this paper. The model used the dragonfly algorithm… More >

  • Open Access

    ARTICLE

    Structural Damage Identification System Suitable for Old Arch Bridge in Rural Regions: Random Forest Approach

    Yu Zhang, Zhihua Xiong*, Zhuoxi Liang, Jiachen She, Chicheng Ma

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 447-469, 2023, DOI:10.32604/cmes.2023.022699 - 05 January 2023

    Abstract A huge number of old arch bridges located in rural regions are at the peak of maintenance. The health monitoring technology of the long-span bridge is hardly applicable to the small-span bridge, owing to the absence of technical resources and sufficient funds in rural regions. There is an urgent need for an economical, fast, and accurate damage identification solution. The authors proposed a damage identification system of an old arch bridge implemented with a machine learning algorithm, which took the vehicle-induced response as the excitation. A damage index was defined based on wavelet packet theory,… More >

  • Open Access

    ARTICLE

    Multi Class Brain Cancer Prediction System Empowered with BRISK Descriptor

    Madona B. Sahaai*, G. R. Jothilakshmi, E. Praveen, V. Hemath Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1507-1521, 2023, DOI:10.32604/iasc.2023.032256 - 05 January 2023

    Abstract Magnetic Resonance Imaging (MRI) is one of the important resources for identifying abnormalities in the human brain. This work proposes an effective Multi-Class Classification (MCC) system using Binary Robust Invariant Scalable Keypoints (BRISK) as texture descriptors for effective classification. At first, the potential Region Of Interests (ROIs) are detected using features from the accelerated segment test algorithm. Then, non-maxima suppression is employed in scale space based on the information in the ROIs. The discriminating power of BRISK is examined using three machine learning classifiers such as k-Nearest Neighbour (kNN), Support Vector Machine (SVM) and Random Forest More >

  • Open Access

    ARTICLE

    Parkinson’s Disease Classification Using Random Forest Kerb Feature Selection

    E. Bharath1,*, T. Rajagopalan2

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1417-1433, 2023, DOI:10.32604/iasc.2023.032102 - 05 January 2023

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease cause by a deficiency of dopamine. Investigators have identified the voice as the underlying symptom of PD. Advanced vocal disorder studies provide adequate treatment and support for accurate PD detection. Machine learning (ML) models have recently helped to solve problems in the classification of chronic diseases. This work aims to analyze the effect of selecting features on ML efficiency on a voice-based PD detection system. It includes PD classification models of Random forest, decision Tree, neural network, logistic regression and support vector machine. The feature selection is made… More >

  • Open Access

    ARTICLE

    Smart Techniques for LULC Micro Class Classification Using Landsat8 Imagery

    Mutiullah Jamil1, Hafeez ul Rehman1, SaleemUllah1, Imran Ashraf2,*, Saqib Ubaid1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5545-5557, 2023, DOI:10.32604/cmc.2023.033449 - 28 December 2022

    Abstract Wheat species play important role in the price of products and wheat production estimation. There are several mathematical models used for the estimation of the wheat crop but these models are implemented without considering the wheat species which is an important independent variable. The task of wheat species identification is challenging both for human experts as well as for computer vision-based solutions. With the use of satellite remote sensing, it is possible to identify and monitor wheat species on a large scale at any stage of the crop life cycle. In this work, nine popular… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373 - 28 December 2022

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom… More >

  • Open Access

    ARTICLE

    Novel Computer-Aided Diagnosis System for the Early Detection of Alzheimer’s Disease

    Meshal Alharbi, Shabana R. Ziyad*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5483-5505, 2023, DOI:10.32604/cmc.2023.032341 - 28 December 2022

    Abstract Aging is a natural process that leads to debility, disease, and dependency. Alzheimer’s disease (AD) causes degeneration of the brain cells leading to cognitive decline and memory loss, as well as dependence on others to fulfill basic daily needs. AD is the major cause of dementia. Computer-aided diagnosis (CADx) tools aid medical practitioners in accurately identifying diseases such as AD in patients. This study aimed to develop a CADx tool for the early detection of AD using the Intelligent Water Drop (IWD) algorithm and the Random Forest (RF) classifier. The IWD algorithm an efficient feature… More >

  • Open Access

    ARTICLE

    A Two-Step Algorithm to Estimate Variable Importance for Multi-State Data: An Application to COVID-19

    Behnaz Alafchi1, Leili Tapak1,*, Hassan Doosti2, Christophe Chesneau3, Ghodratollah Roshanaei1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2047-2064, 2023, DOI:10.32604/cmes.2022.022647 - 23 November 2022

    Abstract Survival data with a multi-state structure are frequently observed in follow-up studies. An analytic approach based on a multi-state model (MSM) should be used in longitudinal health studies in which a patient experiences a sequence of clinical progression events. One main objective in the MSM framework is variable selection, where attempts are made to identify the risk factors associated with the transition hazard rates or probabilities of disease progression. The usual variable selection methods, including stepwise and penalized methods, do not provide information about the importance of variables. In this context, we present a two-step More >

  • Open Access

    ARTICLE

    Wrapper Based Linear Discriminant Analysis (LDA) for Intrusion Detection in IIoT

    B. Yasotha1,*, T. Sasikala2, M. Krishnamurthy3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1625-1640, 2023, DOI:10.32604/csse.2023.025669 - 03 November 2022

    Abstract The internet has become a part of every human life. Also, various devices that are connected through the internet are increasing. Nowadays, the Industrial Internet of things (IIoT) is an evolutionary technology interconnecting various industries in digital platforms to facilitate their development. Moreover, IIoT is being used in various industrial fields such as logistics, manufacturing, metals and mining, gas and oil, transportation, aviation, and energy utilities. It is mandatory that various industrial fields require highly reliable security and preventive measures against cyber-attacks. Intrusion detection is defined as the detection in the network of security threats… More >

  • Open Access

    ARTICLE

    Investigation of Single and Multiple Mutations Prediction Using Binary Classification Approach

    T. Edwin Ponraj1,*, J. Charles2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1189-1203, 2023, DOI:10.32604/iasc.2023.033383 - 29 September 2022

    Abstract The mutation is a critical element in determining the proteins’ stability, becoming a core element in portraying the effects of a drug in the pharmaceutical industry. Doing wet laboratory tests to provide a better perspective on protein mutations is expensive and time-intensive since there are so many potential mutations, computational approaches that can reliably anticipate the consequences of amino acid mutations are critical. This work presents a robust methodology to analyze and identify the effects of mutation on a single protein structure. Initially, the context in a collection of words is determined using a knowledge More >

Displaying 51-60 on page 6 of 128. Per Page