Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (84)
  • Open Access

    ARTICLE

    An Interpretable CNN for the Segmentation of the Left Ventricle in Cardiac MRI by Real-Time Visualization

    Jun Liu1, Geng Yuan2, Changdi Yang2, Houbing Song3, Liang Luo4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1571-1587, 2023, DOI:10.32604/cmes.2022.023195 - 27 October 2022

    Abstract The interpretability of deep learning models has emerged as a compelling area in artificial intelligence research. The safety criteria for medical imaging are highly stringent, and models are required for an explanation. However, existing convolutional neural network solutions for left ventricular segmentation are viewed in terms of inputs and outputs. Thus, the interpretability of CNNs has come into the spotlight. Since medical imaging data are limited, many methods to fine-tune medical imaging models that are popular in transfer models have been built using massive public ImageNet datasets by the transfer learning method. Unfortunately, this generates… More >

  • Open Access

    ARTICLE

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

    Jing He1,2, Haonan Chen3,*, Lingxiao Li4, Yebin Zou5

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 211-237, 2023, DOI:10.32604/cmes.2022.020597 - 29 September 2022

    Abstract There are many sources of geographic big data, and most of them come from heterogeneous environments. The data sources obtained in this case contain attribute information of different spatial scales, different time scales and different complexity levels. It is worth noting that the emergence of new high-dimensional trajectory data types and the increasing number of details are becoming more difficult. In this case, visualizing high-dimensional spatiotemporal trajectory data is extremely challenging. Therefore, i-tStar and its extension i-tStar (3D) proposed, a trajectory behavior feature for moving objects that are integrated into a view with less effort More > Graphic Abstract

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

  • Open Access

    ARTICLE

    Filter and Embedded Feature Selection Methods to Meet Big Data Visualization Challenges

    Kamal A. ElDahshan, AbdAllah A. AlHabshy, Luay Thamer Mohammed*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 817-839, 2023, DOI:10.32604/cmc.2023.032287 - 22 September 2022

    Abstract This study focuses on meeting the challenges of big data visualization by using of data reduction methods based the feature selection methods. To reduce the volume of big data and minimize model training time (Tt) while maintaining data quality. We contributed to meeting the challenges of big data visualization using the embedded method based “Select from model (SFM)” method by using “Random forest Importance algorithm (RFI)” and comparing it with the filter method by using “Select percentile (SP)” method based chi square “Chi2” tool for selecting the most important features, which are then fed into… More >

  • Open Access

    ARTICLE

    Machine Learning and Artificial Neural Network for Predicting Heart Failure Risk

    Polin Rahman1, Ahmed Rifat1, MD. IftehadAmjad Chy1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Sultan Aljahdali2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.021469 - 01 June 2022

    Abstract Heart failure is now widely spread throughout the world. Heart disease affects approximately 48% of the population. It is too expensive and also difficult to cure the disease. This research paper represents machine learning models to predict heart failure. The fundamental concept is to compare the correctness of various Machine Learning (ML) algorithms and boost algorithms to improve models’ accuracy for prediction. Some supervised algorithms like K-Nearest Neighbor (KNN), Support Vector Machine (SVM), Decision Trees (DT), Random Forest (RF), Logistic Regression (LR) are considered to achieve the best results. Some boosting algorithms like Extreme Gradient… More >

  • Open Access

    ARTICLE

    EFFECTS OF BLOCKAGE LOCATIONS FOR ENHANCED HEAT TRANSFER AND FLOW VISUALIZATION IN A TESTED DUCT WITH DUAL-INCLINED BAFFLES (DIB): A CFD ANALYSIS

    Amnart Boonloia, Withada Jedsadaratanachaib,*

    Frontiers in Heat and Mass Transfer, Vol.18, pp. 1-15, 2022, DOI:10.5098/hmt.18.20

    Abstract Numerical analysis of fluid flow mechanism and heat transfer in a heat exchanger duct (HXD) with dual-inclined baffles (DIB) are reported. Three DIB types are examined: 1. “Type A” is located at the center of the HXD, 2. “Type B” is located on the upper-lower duct walls (as an orifice) and 3. “Type C” is a combination of the type A and B (as double orifices). The impacts of the ratio of DIB heights (b) to the square duct height (H; b/H) on increased heat transfer and friction loss are analyzed. Laminar flow (Re =… More >

  • Open Access

    ARTICLE

    VISUALIZATION OF INDUCED COUNTER-ROTATING VORTICES FOR ELECTRIC VEHICLES BATTERY MODULE THERMAL MANAGEMENT

    A.C. Budimana,*, S. M. Hasheminejadb, Sudirjaa, A. Mitayanic, S. H. Winotod

    Frontiers in Heat and Mass Transfer, Vol.19, pp. 1-6, 2022, DOI:10.5098/hmt.19.9

    Abstract Streamwise development of counter-rotating vortices induced by three different types of chevron Vortex Generators (VGs) placed upstream an Electric Vehicles (EV) dummy battery module is experimentally visualized using a smoke-wire method. From the single chevron reference case, the mushroom-like vortices do not collapse until passing the module. When more chevrons are used in line, the vortices become more prominent. It can also be observed that the vortex sizes and shapes are significantly influenced by the spanwise base length of the chevron. The induced vortices from all three VGs suggest a potential heat transfer augmentation for More >

  • Open Access

    ARTICLE

    A Survey on Visualization-Based Malware Detection

    Ahmad Moawad*, Ahmed Ismail Ebada, Aya M. Al-Zoghby

    Journal of Cyber Security, Vol.4, No.3, pp. 169-184, 2022, DOI:10.32604/jcs.2022.033537 - 01 February 2023

    Abstract In computer security, the number of malware threats is increasing and causing damage to systems for individuals or organizations, necessitating a new detection technique capable of detecting a new variant of malware more efficiently than traditional anti-malware methods. Traditional anti-malware software cannot detect new malware variants, and conventional techniques such as static analysis, dynamic analysis, and hybrid analysis are time-consuming and rely on domain experts. Visualization-based malware detection has recently gained popularity due to its accuracy, independence from domain experts, and faster detection time. Visualization-based malware detection uses the image representation of the malware binary More >

  • Open Access

    ARTICLE

    Design of a Web Crawler for Water Quality Monitoring Data and Data Visualization

    Ziwen Yu1, Jianjun Zhang1,*, Wenwu Tan1, Ziyi Xiong1, Peilun Li1, Liangqing Meng2, Haijun Lin1, Guang Sun3, Peng Guo4

    Journal on Big Data, Vol.4, No.2, pp. 135-143, 2022, DOI:10.32604/jbd.2022.031024 - 31 October 2022

    Abstract Many countries are paying more and more attention to the protection of water resources at present, and how to protect water resources has received extensive attention from society. Water quality monitoring is the key work to water resources protection. How to efficiently collect and analyze water quality monitoring data is an important aspect of water resources protection. In this paper, python programming tools and regular expressions were used to design a web crawler for the acquisition of water quality monitoring data from Global Freshwater Quality Database (GEMStat) sites, and the multi-thread parallelism was added to More >

  • Open Access

    ARTICLE

    Pedestrian Physical Education Training Over Visualization Tool

    Tamara al Shloul1, Israr Akhter2, Suliman A. Alsuhibany3, Yazeed Yasin Ghadi4, Ahmad Jalal2, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2389-2405, 2022, DOI:10.32604/cmc.2022.027007 - 16 June 2022

    Abstract E-learning approaches are one of the most important learning platforms for the learner through electronic equipment. Such study techniques are useful for other groups of learners such as the crowd, pedestrian, sports, transports, communication, emergency services, management systems and education sectors. E-learning is still a challenging domain for researchers and developers to find new trends and advanced tools and methods. Many of them are currently working on this domain to fulfill the requirements of industry and the environment. In this paper, we proposed a method for pedestrian behavior mining of aerial data, using deep flow… More >

  • Open Access

    ARTICLE

    Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects

    Jun-Seob Kim, Ki-Woong Park*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3401-3424, 2022, DOI:10.32604/cmc.2022.026621 - 29 March 2022

    Abstract A ransomware attack that interrupted the operation of Colonial Pipeline (a large U.S. oil pipeline company), showed that security threats by malware have become serious enough to affect industries and social infrastructure rather than individuals alone. The agents and characteristics of attacks should be identified, and appropriate strategies should be established accordingly in order to respond to such attacks. For this purpose, the first task that must be performed is malware classification. Malware creators are well aware of this and apply various concealment and avoidance techniques, making it difficult to classify malware. This study focuses… More >

Displaying 31-40 on page 4 of 84. Per Page