Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,879)
  • Open Access

    REVIEW

    Discrete Choice Models and Artificial Intelligence Techniques for Predicting the Determinants of Transport Mode Choice—A Systematic Review

    Mujahid Ali*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2161-2194, 2024, DOI:10.32604/cmc.2024.058888 - 18 November 2024

    Abstract Forecasting travel demand requires a grasp of individual decision-making behavior. However, transport mode choice (TMC) is determined by personal and contextual factors that vary from person to person. Numerous characteristics have a substantial impact on travel behavior (TB), which makes it important to take into account while studying transport options. Traditional statistical techniques frequently presume linear correlations, but real-world data rarely follows these presumptions, which may make it harder to grasp the complex interactions. Thorough systematic review was conducted to examine how machine learning (ML) approaches might successfully capture nonlinear correlations that conventional methods may… More >

  • Open Access

    ARTICLE

    Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model

    Farida Asriani1,2, Azhari Azhari1,*, Wahyono Wahyono1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3079-3096, 2024, DOI:10.32604/cmc.2024.058193 - 18 November 2024

    Abstract Incredible progress has been made in human action recognition (HAR), significantly impacting computer vision applications in sports analytics. However, identifying dynamic and complex movements in sports like badminton remains challenging due to the need for precise recognition accuracy and better management of complex motion patterns. Deep learning techniques like convolutional neural networks (CNNs), long short-term memory (LSTM), and graph convolutional networks (GCNs) improve recognition in large datasets, while the traditional machine learning methods like SVM (support vector machines), RF (random forest), and LR (logistic regression), combined with handcrafted features and ensemble approaches, perform well but… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries

    Tao Yan1, Javed Rashid2,3, Muhammad Shoaib Saleem3,4, Sajjad Ahmad4, Muhammad Faheem5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2685-2708, 2024, DOI:10.32604/cmc.2024.058186 - 18 November 2024

    Abstract Electricity is essential for keeping power networks balanced between supply and demand, especially since it costs a lot to store. The article talks about different deep learning methods that are used to guess how much green energy different Asian countries will produce. The main goal is to make reliable and accurate predictions that can help with the planning of new power plants to meet rising demand. There is a new deep learning model called the Green-electrical Production Ensemble (GP-Ensemble). It combines three types of neural networks: convolutional neural networks (CNNs), gated recurrent units (GRUs), and… More >

  • Open Access

    ARTICLE

    IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication

    Samsul Huda1,*, Yasuyuki Nogami2, Maya Rahayu2, Takuma Akada2, Md. Biplob Hossain2, Muhammad Bisri Musthafa2, Yang Jie2, Le Hoang Anh2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3165-3187, 2024, DOI:10.32604/cmc.2024.058144 - 18 November 2024

    Abstract Global food security is a pressing issue that affects the stability and well-being of communities worldwide. While existing Internet of Things (IoT) enabled plant monitoring systems have made significant strides in agricultural monitoring, they often face limitations such as high power consumption, restricted mobility, complex deployment requirements, and inadequate security measures for data access. This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings. Our system strategically combines power efficiency, portability, and secure access capabilities, assisting farmers in monitoring and tracking crop environmental conditions. The proposed system includes a… More >

  • Open Access

    ARTICLE

    Enhancing Fire Detection Performance Based on Fine-Tuned YOLOv10

    Trong Thua Huynh*, Hoang Thanh Nguyen, Du Thang Phu

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2281-2298, 2024, DOI:10.32604/cmc.2024.057954 - 18 November 2024

    Abstract In recent years, early detection and warning of fires have posed a significant challenge to environmental protection and human safety. Deep learning models such as Faster R-CNN (Faster Region based Convolutional Neural Network), YOLO (You Only Look Once), and their variants have demonstrated superiority in quickly detecting objects from images and videos, creating new opportunities to enhance automatic and efficient fire detection. The YOLO model, especially newer versions like YOLOv10, stands out for its fast processing capability, making it suitable for low-latency applications. However, when applied to real-world datasets, the accuracy of fire prediction is… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data

    Jian Su1, Haijian Shao1,2,*, Xing Deng1, Yingtao Jiang2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2219-2242, 2024, DOI:10.32604/cmc.2024.057604 - 18 November 2024

    Abstract The rapidly advancing Convolutional Neural Networks (CNNs) have brought about a paradigm shift in various computer vision tasks, while also garnering increasing interest and application in sensor-based Human Activity Recognition (HAR) efforts. However, the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained systems. This paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain, which reduces the model’s depth and accelerates activity inference. Unlike traditional pruning methods that focus on the spatial domain and the importance of filters, this… More >

  • Open Access

    ARTICLE

    Attribute Reduction on Decision Tables Based on Hausdorff Topology

    Nguyen Long Giang1, Tran Thanh Dai2, Le Hoang Son3, Tran Thi Ngan4, Nguyen Nhu Son1, Cu Nguyen Giap5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3097-3124, 2024, DOI:10.32604/cmc.2024.057383 - 18 November 2024

    Abstract Attribute reduction through the combined approach of Rough Sets (RS) and algebraic topology is an open research topic with significant potential for applications. Several research works have introduced a strong relationship between RS and topology spaces for the attribute reduction problem. However, the mentioned recent methods followed a strategy to construct a new measure for attribute selection. Meanwhile, the strategy for searching for the reduct is still to select each attribute and gradually add it to the reduct. Consequently, those methods tended to be inefficient for high-dimensional datasets. To overcome these challenges, we use the… More >

  • Open Access

    ARTICLE

    GL-YOLOv5: An Improved Lightweight Non-Dimensional Attention Algorithm Based on YOLOv5

    Yuefan Liu, Ducheng Zhang, Chen Guo*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3281-3299, 2024, DOI:10.32604/cmc.2024.057294 - 18 November 2024

    Abstract Craniocerebral injuries represent the primary cause of fatalities among riders involved in two-wheeler accidents; nevertheless, the prevalence of helmet usage among these riders remains alarmingly low. Consequently, the accurate identification of riders who are wearing safety helmets is of paramount importance. Current detection algorithms exhibit several limitations, including inadequate accuracy, substantial model size, and suboptimal performance in complex environments with small targets. To address these challenges, we propose a novel lightweight detection algorithm, termed GL-YOLOv5, which is an enhancement of the You Only Look Once version 5 (YOLOv5) framework. This model incorporates a Global DualPooling… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT

    Arar Al Tawil1,*, Laiali Almazaydeh2, Doaa Qawasmeh3, Baraah Qawasmeh4, Mohammad Alshinwan1,5, Khaled Elleithy6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3395-3412, 2024, DOI:10.32604/cmc.2024.057279 - 18 November 2024

    Abstract Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information, a practice known as phishing. This study utilizes three distinct methodologies, Term Frequency-Inverse Document Frequency, Word2Vec, and Bidirectional Encoder Representations from Transformers, to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks. The study uses feature extraction methods to assess the performance of Logistic Regression, Decision Tree, Random Forest, and Multilayer Perceptron algorithms. The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron (Precision: 0.98, Recall: 0.98, F1-score: 0.98, Accuracy: 0.98). Word2Vec’s More >

Displaying 1-10 on page 1 of 5879. Per Page