Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Numerical Investigation of Malaria Disease Dynamics in Fuzzy Environment

    Fazal Dayan1,*, Dumitru Baleanu2,3,4, Nauman Ahmed5, Jan Awrejcewicz6, Muhammad Rafiq7, Ali Raza8, Muhammad Ozair Ahmad5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2345-2361, 2023, DOI:10.32604/cmc.2023.033261

    Abstract The application of fuzzy theory is vital in all scientific disciplines. The construction of mathematical models with fuzziness is little studied in the literature. With this in mind and for a better understanding of the disease, an SEIR model of malaria transmission with fuzziness is examined in this study by extending a classical model of malaria transmission. The parameters and , being function of the malaria virus load, are considered fuzzy numbers. Three steady states and the reproduction number of the model are analyzed in fuzzy senses. A numerical technique is developed in a fuzzy environment to solve the studied… More >

  • Open Access

    ARTICLE

    An Intelligent Hazardous Waste Detection and Classification Model Using Ensemble Learning Techniques

    Mesfer Al Duhayyim1,*, Saud S. Alotaibi2, Shaha Al-Otaibi3, Fahd N. Al-Wesabi4, Mahmoud Othman5, Ishfaq Yaseen6, Mohammed Rizwanullah6, Abdelwahed Motwakel6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3315-3332, 2023, DOI:10.32604/cmc.2023.033250

    Abstract Proper waste management models using recent technologies like computer vision, machine learning (ML), and deep learning (DL) are needed to effectively handle the massive quantity of increasing waste. Therefore, waste classification becomes a crucial topic which helps to categorize waste into hazardous or non-hazardous ones and thereby assist in the decision making of the waste management process. This study concentrates on the design of hazardous waste detection and classification using ensemble learning (HWDC-EL) technique to reduce toxicity and improve human health. The goal of the HWDC-EL technique is to detect the multiple classes of wastes, particularly hazardous and non-hazardous wastes.… More >

  • Open Access

    ARTICLE

    An Intelligence Computational Approach for the Fractional 4D Chaotic Financial Model

    Wajaree Weera1, Thongchai Botmart1,*, Charuwat Chantawat1, Zulqurnain Sabir2,3, Waleed Adel4,5, Muhammad Asif Zahoor Raja6, Muhammad Kristiawan7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2711-2724, 2023, DOI:10.32604/cmc.2023.033233

    Abstract The main purpose of the study is to present a numerical approach to investigate the numerical performances of the fractional 4-D chaotic financial system using a stochastic procedure. The stochastic procedures mainly depend on the combination of the artificial neural network (ANNs) along with the Levenberg-Marquardt Backpropagation (LMB) i.e., ANNs-LMB technique. The fractional-order term is defined in the Caputo sense and three cases are solved using the proposed technique for different values of the fractional order α. The values of the fractional order derivatives to solve the fractional 4-D chaotic financial system are used between 0 and 1. The data… More >

  • Open Access

    ARTICLE

    A Neural Study of the Fractional Heroin Epidemic Model

    Wajaree Weera1, Thongchai Botmart1,*, Samina Zuhra2, Zulqurnain Sabir3, Muhammad Asif Zahoor Raja4, Salem Ben Said5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4453-4467, 2023, DOI:10.32604/cmc.2023.033232

    Abstract This works intends to provide numerical solutions based on the nonlinear fractional order derivatives of the classical White and Comiskey model (NFD-WCM). The fractional order derivatives have provided authentic and accurate solutions for the NDF-WCM. The solutions of the fractional NFD-WCM are provided using the stochastic computing supervised algorithm named Levenberg-Marquard Backpropagation (LMB) based on neural networks (NNs). This regression approach combines gradient descent and Gauss-Newton iterative methods, which means finding a solution through the sequences of different calculations. WCM is used to demonstrate the heroin epidemics. Heroin has been on-growth world wide, mainly in Asia, Europe, and the USA.… More >

  • Open Access

    ARTICLE

    Load Balancing Based on Multi-Agent Framework to Enhance Cloud Environment

    Shrouk H. Hessen1,2,*, Hatem M. Abdul-kader1, Ayman E. Khedr3, Rashed K. Salem1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3015-3028, 2023, DOI:10.32604/cmc.2023.033212

    Abstract According to the advances in users’ service requirements, physical hardware accessibility, and speed of resource delivery, Cloud Computing (CC) is an essential technology to be used in many fields. Moreover, the Internet of Things (IoT) is employed for more communication flexibility and richness that are required to obtain fruitful services. A multi-agent system might be a proper solution to control the load balancing of interaction and communication among agents. This paper proposes a multi-agent load balancing framework that consists of two phases to optimize the workload among different servers with large-scale CC power with various utilities and a significant number… More >

  • Open Access

    ARTICLE

    An Adaptive Privacy Preserving Framework for Distributed Association Rule Mining in Healthcare Databases

    Hasanien K. Kuba1, Mustafa A. Azzawi2, Saad M. Darwish3,*, Oday A. Hassen4, Ansam A. Abdulhussein5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4119-4133, 2023, DOI:10.32604/cmc.2023.033182

    Abstract It is crucial, while using healthcare data, to assess the advantages of data privacy against the possible drawbacks. Data from several sources must be combined for use in many data mining applications. The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and implement preventive measures. Historically, numerous heuristics (e.g., greedy search) and metaheuristics-based techniques (e.g., evolutionary algorithm) have been created for the positive association rule in privacy preserving data mining (PPDM). When it comes to connecting seemingly unrelated diseases and drugs, negative association rules may be more informative… More >

  • Open Access

    ARTICLE

    Type-2 Neutrosophic Set and Their Applications in Medical Databases Deadlock Resolution

    Marwan H. Hassan1, Saad M. Darwish2,*, Saleh M. Elkaffas3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4417-4434, 2023, DOI:10.32604/cmc.2023.033175

    Abstract Electronic patient data gives many advantages, but also new difficulties. Deadlocks may delay procedures like acquiring patient information. Distributed deadlock resolution solutions introduce uncertainty due to inaccurate transaction properties. Soft computing-based solutions have been developed to solve this challenge. In a single framework, ambiguous, vague, incomplete, and inconsistent transaction attribute information has received minimal attention. The work presented in this paper employed type-2 neutrosophic logic, an extension of type-1 neutrosophic logic, to handle uncertainty in real-time deadlock-resolving systems. The proposed method is structured to reflect multiple types of knowledge and relations among transactions’ features that include validation factor degree, slackness… More >

  • Open Access

    ARTICLE

    A Hyperparameter Optimization for Galaxy Classification

    Fatih Ahmet Şenel*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4587-4600, 2023, DOI:10.32604/cmc.2023.033155

    Abstract In this study, the morphological galaxy classification process was carried out with a hybrid approach. Since the Galaxy classification process may contain detailed information about the universe’s formation, it remains the current research topic. Researchers divided more than 100 billion galaxies into ten different classes. It is not always possible to understand which class the galaxy types belong. However, Artificial Intelligence (AI) can be used for successful classification. There are studies on the automatic classification of galaxies into a small number of classes. As the number of classes increases, the success of the used methods decreases. Based on the literature,… More >

  • Open Access

    ARTICLE

    Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection Systems

    Reem Alkanhel1,*, Doaa Sami Khafaga2, El-Sayed M. El-kenawy3, Abdelaziz A. Abdelhamid4,5, Abdelhameed Ibrahim6, Rashid Amin7, Mostafa Abotaleb8, B. M. El-den6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2695-2709, 2023, DOI:10.32604/cmc.2023.033153

    Abstract The Internet of Things (IoT) is a modern approach that enables connection with a wide variety of devices remotely. Due to the resource constraints and open nature of IoT nodes, the routing protocol for low power and lossy (RPL) networks may be vulnerable to several routing attacks. That’s why a network intrusion detection system (NIDS) is needed to guard against routing assaults on RPL-based IoT networks. The imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network attacks. Therefore, we propose in this paper a novel approach to balance… More >

  • Open Access

    ARTICLE

    Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding

    Yong Fang, Zhiying Zhao, Yijia Xu*, Zhonglin Liu

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4099-4118, 2023, DOI:10.32604/cmc.2023.033124

    Abstract System logs are essential for detecting anomalies, querying faults, and tracing attacks. Because of the time-consuming and labor-intensive nature of manual system troubleshooting and anomaly detection, it cannot meet the actual needs. The implementation of automated log anomaly detection is a topic that demands urgent research. However, the prior work on processing log data is mainly one-dimensional and cannot profoundly learn the complex associations in log data. Meanwhile, there is a lack of attention to the utilization of log labels and usually relies on a large number of labels for detection. This paper proposes a novel and practical detection model… More >

Displaying 1191-1200 on page 120 of 5350. Per Page