Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (560)
  • Open Access

    ARTICLE

    A New Method for Diagnosis of Leukemia Utilizing a Hybrid DL-ML Approach for Binary and Multi-Class Classification on a Limited-Sized Database

    Nilkanth Mukund Deshpande1,2, Shilpa Gite3,4,*, Biswajeet Pradhan5,6, Abdullah Alamri7, Chang-Wook Lee8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.030704

    Abstract Infection of leukemia in humans causes many complications in its later stages. It impairs bone marrow’s ability to produce blood. Morphological diagnosis of human blood cells is a well-known and well-proven technique for diagnosis in this case. The binary classification is employed to distinguish between normal and leukemiainfected cells. In addition, various subtypes of leukemia require different treatments. These sub-classes must also be detected to obtain an accurate diagnosis of the type of leukemia. This entails using multi-class classification to determine the leukemia subtype. This is usually done using a microscopic examination of these blood cells. Due to the requirement… More > Graphic Abstract

    A New Method for Diagnosis of Leukemia Utilizing a Hybrid DL-ML Approach for Binary and Multi-Class Classification on a Limited-Sized Database

  • Open Access

    REVIEW

    Exploring Deep Learning Methods for Computer Vision Applications across Multiple Sectors: Challenges and Future Trends

    Narayanan Ganesh1, Rajendran Shankar2, Miroslav Mahdal3, Janakiraman Senthil Murugan4, Jasgurpreet Singh Chohan5, Kanak Kalita6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.028018

    Abstract Computer vision (CV) was developed for computers and other systems to act or make recommendations based on visual inputs, such as digital photos, movies, and other media. Deep learning (DL) methods are more successful than other traditional machine learning (ML) methods in CV. DL techniques can produce state-of-the-art results for difficult CV problems like picture categorization, object detection, and face recognition. In this review, a structured discussion on the history, methods, and applications of DL methods to CV problems is presented. The sector-wise presentation of applications in this paper may be particularly useful for researchers in niche fields who have… More >

  • Open Access

    ARTICLE

    3D Road Network Modeling and Road Structure Recognition in Internet of Vehicles

    Dun Cao1, Jia Ru1, Jian Qin1, Amr Tolba2, Jin Wang1, Min Zhu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.030260

    Abstract Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles, people, transportation infrastructure, and networks, thereby realizing a more intelligent and efficient transportation system. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topological structure of IoV to have the high space and time complexity. Network modeling and structure recognition for 3D roads can benefit the description of topological changes for IoV. This paper proposes a 3D general road model based on discrete points of roads obtained from GIS. First, the constraints imposed by 3D roads on… More >

  • Open Access

    ARTICLE

    Quick Weighing of Passing Vehicles Using the Transfer-Learning-Enhanced Convolutional Neural Network

    Wangchen Yan1,*, Jinbao Yang1, Xin Luo2

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.044709

    Abstract Transfer learning could reduce the time and resources required for the training of new models and be therefore important in generalized applications of the trained machine learning algorithms. In this study, a transfer learningenhanced convolutional neural network (CNN) was proposed to identify the gross weight and the axle weight of moving vehicles on the bridge. The proposed transfer learning-enhanced CNN model was expected to weigh different bridges based on a small amount of training datasets and provide high identification accuracy. First of all, a CNN algorithm for bridge weigh-in-motion (B-WIM) technology was proposed to identify the axle weight and the… More >

  • Open Access

    REVIEW

    Exploring the Latest Applications of OpenAI and ChatGPT: An In-Depth Survey

    Hong Zhang1,*, Haijian Shao2

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.030649

    Abstract OpenAI and ChatGPT, as state-of-the-art language models driven by cutting-edge artificial intelligence technology, have gained widespread adoption across diverse industries. In the realm of computer vision, these models have been employed for intricate tasks including object recognition, image generation, and image processing, leveraging their advanced capabilities to fuel transformative breakthroughs. Within the gaming industry, they have found utility in crafting virtual characters and generating plots and dialogues, thereby enabling immersive and interactive player experiences. Furthermore, these models have been harnessed in the realm of medical diagnosis, providing invaluable insights and support to healthcare professionals in the realm of disease detection.… More > Graphic Abstract

    Exploring the Latest Applications of OpenAI and ChatGPT: An In-Depth Survey

  • Open Access

    ARTICLE

    An Optimized System of Random Forest Model by Global Harmony Search with Generalized Opposition-Based Learning for Forecasting TBM Advance Rate

    Yingui Qiu1, Shuai Huang1, Danial Jahed Armaghani2, Biswajeet Pradhan3, Annan Zhou4, Jian Zhou1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.029938

    Abstract As massive underground projects have become popular in dense urban cities, a problem has arisen: which model predicts the best for Tunnel Boring Machine (TBM) performance in these tunneling projects? However, performance level of TBMs in complex geological conditions is still a great challenge for practitioners and researchers. On the other hand, a reliable and accurate prediction of TBM performance is essential to planning an applicable tunnel construction schedule. The performance of TBM is very diffcult to estimate due to various geotechnical and geological factors and machine specifications. The previously-proposed intelligent techniques in this field are mostly based on a… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Computational Intelligent Systems for Solving Complex Engineering Problems: Principles and Applications

    Danial Jahed Armaghani1,*, Ahmed Salih Mohammed2,3, Ramesh Murlidhar Bhatawdekar4, Pouyan Fakharian5, Ashutosh Kainthola6, Wael Imad Mahmood7

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.031701

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Overall Assessment of Heat Transfer for a Rarefied Flow in a Microchannel with Obstacles Using Lattice Boltzmann Method

    Siham Hammid1, Khatir Naima2, Omolayo M. Ikumapayi3, Cheikh Kezrane1, Abdelkrim Liazid4, Jihad Asad5, Mokdad Hayawi Rahman6, Farhan Lafta Rashid7, Naseer Ali Hussien8, Younes Menni2,9,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.028951

    Abstract The objective of this investigation is to assess the effect of obstacles on numerical heat transfer and fluid flow momentum in a rectangular microchannel (MC). Two distinct configurations were studied: one without obstacles and the other with alternating obstacles placed on the upper and lower walls. The research utilized the thermal lattice Boltzmann method (LBM), which solves the energy and momentum equations of fluids with the BGK approximation, implemented in a Python coding environment. Temperature jump and slip velocity conditions were utilized in the simulation for the MC and extended to all obstacle boundaries. The study aims to analyze the… More >

  • Open Access

    ARTICLE

    A Novel Accurate Method for Multi-Term Time-Fractional Nonlinear Diffusion Equations in Arbitrary Domains

    Tao Hu1, Cheng Huang2, Sergiy Reutskiy3,*, Jun Lu4, Ji Lin5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.030449

    Abstract A novel accurate method is proposed to solve a broad variety of linear and nonlinear (1+1)-dimensional and (2+1)- dimensional multi-term time-fractional partial differential equations with spatial operators of anisotropic diffusivity. For (1+1)-dimensional problems, analytical solutions that satisfy the boundary requirements are derived. Such solutions are numerically calculated using the trigonometric basis approximation for (2+1)-dimensional problems. With the aid of these analytical or numerical approximations, the original problems can be converted into the fractional ordinary differential equations, and solutions to the fractional ordinary differential equations are approximated by modified radial basis functions with time-dependent coefficients. An efficient backward substitution strategy that… More >

  • Open Access

    ARTICLE

    A Differential Privacy Federated Learning Scheme Based on Adaptive Gaussian Noise

    Sanxiu Jiao1, Lecai Cai2,*, Xinjie Wang1, Kui Cheng2, Xiang Gao3

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.030512

    Abstract As a distributed machine learning method, federated learning (FL) has the advantage of naturally protecting data privacy. It keeps data locally and trains local models through local data to protect the privacy of local data. The federated learning method effectively solves the problem of artificial Smart data islands and privacy protection issues. However, existing research shows that attackers may still steal user information by analyzing the parameters in the federated learning training process and the aggregation parameters on the server side. To solve this problem, differential privacy (DP) techniques are widely used for privacy protection in federated learning. However, adding… More >

Displaying 131-140 on page 14 of 560. Per Page