Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (337)
  • Open Access

    REVIEW

    Research Progress of Photovoltaic Power Prediction Technology Based on Artificial Intelligence Methods

    Daixuan Zhou1, Yujin Liu1, Xu Wang2, Fuxing Wang1, Yan Jia2,*

    Energy Engineering, Vol.121, No.12, pp. 3573-3616, 2024, DOI:10.32604/ee.2024.055853 - 22 November 2024

    Abstract With the increasing proportion of renewable energy in China’s energy structure, among which photovoltaic power generation is also developing rapidly. As the photovoltaic (PV) power output is highly unstable and subject to a variety of factors, it brings great challenges to the stable operation and dispatch of the power grid. Therefore, accurate short-term PV power prediction is of great significance to ensure the safe grid connection of PV energy. Currently, the short-term prediction of PV power has received extensive attention and research, but the accuracy and precision of the prediction have to be further improved. More > Graphic Abstract

    Research Progress of Photovoltaic Power Prediction Technology Based on Artificial Intelligence Methods

  • Open Access

    ARTICLE

    Evaluating Public Sentiments during Uttarakhand Flood: An Artificial Intelligence Techniques

    Stephen Afrifa1,2,*, Vijayakumar Varadarajan3,4,5,*, Peter Appiahene2, Tao Zhang1, Richmond Afrifa6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1625-1639, 2024, DOI:10.32604/csse.2024.055084 - 22 November 2024

    Abstract Users of social networks can readily express their thoughts on websites like Twitter (now X), Facebook, and Instagram. The volume of textual data flowing from users has greatly increased with the advent of social media in comparison to traditional media. For instance, using natural language processing (NLP) methods, social media can be leveraged to obtain crucial information on the present situation during disasters. In this work, tweets on the Uttarakhand flash flood are analyzed using a hybrid NLP model. This investigation employed sentiment analysis (SA) to determine the people’s expressed negative attitudes regarding the disaster. More >

  • Open Access

    REVIEW

    Discrete Choice Models and Artificial Intelligence Techniques for Predicting the Determinants of Transport Mode Choice—A Systematic Review

    Mujahid Ali*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2161-2194, 2024, DOI:10.32604/cmc.2024.058888 - 18 November 2024

    Abstract Forecasting travel demand requires a grasp of individual decision-making behavior. However, transport mode choice (TMC) is determined by personal and contextual factors that vary from person to person. Numerous characteristics have a substantial impact on travel behavior (TB), which makes it important to take into account while studying transport options. Traditional statistical techniques frequently presume linear correlations, but real-world data rarely follows these presumptions, which may make it harder to grasp the complex interactions. Thorough systematic review was conducted to examine how machine learning (ML) approaches might successfully capture nonlinear correlations that conventional methods may… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

  • Open Access

    REVIEW

    AI-Driven Pattern Recognition in Medicinal Plants: A Comprehensive Review and Comparative Analysis

    Mohd Asif Hajam1, Tasleem Arif1, Akib Mohi Ud Din Khanday2, Mudasir Ahmad Wani3,*, Muhammad Asim3,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2077-2131, 2024, DOI:10.32604/cmc.2024.057136 - 18 November 2024

    Abstract The pharmaceutical industry increasingly values medicinal plants due to their perceived safety and cost-effectiveness compared to modern drugs. Throughout the extensive history of medicinal plant usage, various plant parts, including flowers, leaves, and roots, have been acknowledged for their healing properties and employed in plant identification. Leaf images, however, stand out as the preferred and easily accessible source of information. Manual plant identification by plant taxonomists is intricate, time-consuming, and prone to errors, relying heavily on human perception. Artificial intelligence (AI) techniques offer a solution by automating plant recognition processes. This study thoroughly examines cutting-edge… More >

  • Open Access

    ARTICLE

    LDNet: A Robust Hybrid Approach for Lie Detection Using Deep Learning Techniques

    Shanjita Akter Prome1, Md Rafiqul Islam2,*, Md. Kowsar Hossain Sakib1, David Asirvatham1, Neethiahnanthan Ari Ragavan3, Cesar Sanin2, Edward Szczerbicki4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2845-2871, 2024, DOI:10.32604/cmc.2024.055311 - 18 November 2024

    Abstract Deception detection is regarded as a concern for everyone in their daily lives and affects social interactions. The human face is a rich source of data that offers trustworthy markers of deception. The deception or lie detection systems are non-intrusive, cost-effective, and mobile by identifying facial expressions. Over the last decade, numerous studies have been conducted on deception detection using several advanced techniques. Researchers have focused their attention on inventing more effective and efficient solutions for the detection of deception. So, it could be challenging to spot trends, practical approaches, gaps, and chances for contribution.… More >

  • Open Access

    REVIEW

    Analysing Recent Breakthroughs in Fault Diagnosis through Sensor: A Comprehensive Overview

    Sumika Chauhan, Govind Vashishtha*, Radoslaw Zimroz

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 1983-2020, 2024, DOI:10.32604/cmes.2024.055633 - 31 October 2024

    Abstract Sensors, vital elements in data acquisition systems, play a crucial role in various industries. However, their exposure to harsh operating conditions makes them vulnerable to faults that can compromise system performance. Early fault detection is therefore critical for minimizing downtime and ensuring system reliability. This paper delves into the contemporary landscape of fault diagnosis techniques for sensors, offering valuable insights for researchers and academicians. The papers begin by exploring the different types and causes of sensor faults, followed by a discussion of the various fault diagnosis methods employed in industrial sectors. The advantages and limitations More >

  • Open Access

    ARTICLE

    Artificial Intelligence-Driven FVM-ANN Model for Entropy Analysis of MHD Natural Bioconvection in Nanofluid-Filled Porous Cavities

    Noura Alsedais1, Mohamed Ahmed Mansour2, Abdelraheem M. Aly3, Sara I. Abdelsalam4,5,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.5, pp. 1277-1307, 2024, DOI:10.32604/fhmt.2024.056087 - 30 October 2024

    Abstract The research examines fluid behavior in a porous box-shaped enclosure. The fluid contains nanoscale particles and swimming microbes and is subject to magnetic forces at an angle. Natural circulation driven by biological factors is investigated. The analysis combines a traditional numerical approach with machine learning techniques. Mathematical equations describing the system are transformed into a dimensionless form and then solved using computational methods. The artificial neural network (ANN) model, trained with the Levenberg-Marquardt method, accurately predicts values, showing high correlation (R = 1), low mean squared error (MSE), and minimal error clustering. Parametric analysis reveals significant… More >

  • Open Access

    ARTICLE

    Demand-Responsive Transportation Vehicle Routing Optimization Based on Two-Stage Method

    Jingfa Ma, Hu Liu*, Lingxiao Chen

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 443-469, 2024, DOI:10.32604/cmc.2024.056209 - 15 October 2024

    Abstract Demand-responsive transportation (DRT) is a flexible passenger service designed to enhance road efficiency, reduce peak-hour traffic, and boost passenger satisfaction. However, existing optimization methods for initial passenger requests fall short in addressing real-time passenger needs. Consequently, there is a need to develop real-time DRT route optimization methods that integrate both initial and real-time requests. This paper presents a two-stage, multi-objective optimization model for DRT vehicle scheduling. The first stage involves an initial scheduling model aimed at minimizing vehicle configuration, and operational, and CO2 emission costs while ensuring passenger satisfaction. The second stage develops a real-time scheduling… More >

  • Open Access

    REVIEW

    Enhancing Internet of Things Intrusion Detection Using Artificial Intelligence

    Shachar Bar1, P. W. C. Prasad2, Md Shohel Sayeed3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1-23, 2024, DOI:10.32604/cmc.2024.053861 - 15 October 2024

    Abstract Escalating cyber security threats and the increased use of Internet of Things (IoT) devices require utilisation of the latest technologies available to supply adequate protection. The aim of Intrusion Detection Systems (IDS) is to prevent malicious attacks that corrupt operations and interrupt data flow, which might have significant impact on critical industries and infrastructure. This research examines existing IDS, based on Artificial Intelligence (AI) for IoT devices, methods, and techniques. The contribution of this study consists of identification of the most effective IDS systems in terms of accuracy, precision, recall and F1-score; this research also… More >

Displaying 1-10 on page 1 of 337. Per Page