Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,016)
  • Open Access

    ARTICLE

    Reinforcement Learning Model for Energy System Management to Ensure Energy Efficiency and Comfort in Buildings

    Inna Bilous1, Dmytro Biriukov1, Dmytro Karpenko2, Tatiana Eutukhova2, Oleksandr Novoseltsev2,*, Volodymyr Voloshchuk1

    Energy Engineering, Vol.121, No.12, pp. 3617-3634, 2024, DOI:10.32604/ee.2024.051684 - 22 November 2024

    Abstract This article focuses on the challenges of modeling energy supply systems for buildings, encompassing both methods and tools for simulating thermal regimes and engineering systems within buildings. Enhancing the comfort of living or working in buildings often necessitates increased consumption of energy and material, such as for thermal upgrades, which consequently incurs additional economic costs. It is crucial to acknowledge that such improvements do not always lead to a decrease in total pollutant emissions, considering emissions across all stages of production and usage of energy and materials aimed at boosting energy efficiency and comfort in… More > Graphic Abstract

    Reinforcement Learning Model for Energy System Management to Ensure Energy Efficiency and Comfort in Buildings

  • Open Access

    REVIEW

    Software Reliability Prediction Using Ensemble Learning on Selected Features in Imbalanced and Balanced Datasets: A Review

    Suneel Kumar Rath1, Madhusmita Sahu1, Shom Prasad Das2, Junali Jasmine Jena3, Chitralekha Jena4, Baseem Khan5,6,7,*, Ahmed Ali7, Pitshou Bokoro7

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1513-1536, 2024, DOI:10.32604/csse.2024.057067 - 22 November 2024

    Abstract Redundancy, correlation, feature irrelevance, and missing samples are just a few problems that make it difficult to analyze software defect data. Additionally, it might be challenging to maintain an even distribution of data relating to both defective and non-defective software. The latter software class’s data are predominately present in the dataset in the majority of experimental situations. The objective of this review study is to demonstrate the effectiveness of combining ensemble learning and feature selection in improving the performance of defect classification. Besides the successful feature selection approach, a novel variant of the ensemble learning… More >

  • Open Access

    REVIEW

    Discrete Choice Models and Artificial Intelligence Techniques for Predicting the Determinants of Transport Mode Choice—A Systematic Review

    Mujahid Ali*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2161-2194, 2024, DOI:10.32604/cmc.2024.058888 - 18 November 2024

    Abstract Forecasting travel demand requires a grasp of individual decision-making behavior. However, transport mode choice (TMC) is determined by personal and contextual factors that vary from person to person. Numerous characteristics have a substantial impact on travel behavior (TB), which makes it important to take into account while studying transport options. Traditional statistical techniques frequently presume linear correlations, but real-world data rarely follows these presumptions, which may make it harder to grasp the complex interactions. Thorough systematic review was conducted to examine how machine learning (ML) approaches might successfully capture nonlinear correlations that conventional methods may… More >

  • Open Access

    ARTICLE

    Improving Badminton Action Recognition Using Spatio-Temporal Analysis and a Weighted Ensemble Learning Model

    Farida Asriani1,2, Azhari Azhari1,*, Wahyono Wahyono1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3079-3096, 2024, DOI:10.32604/cmc.2024.058193 - 18 November 2024

    Abstract Incredible progress has been made in human action recognition (HAR), significantly impacting computer vision applications in sports analytics. However, identifying dynamic and complex movements in sports like badminton remains challenging due to the need for precise recognition accuracy and better management of complex motion patterns. Deep learning techniques like convolutional neural networks (CNNs), long short-term memory (LSTM), and graph convolutional networks (GCNs) improve recognition in large datasets, while the traditional machine learning methods like SVM (support vector machines), RF (random forest), and LR (logistic regression), combined with handcrafted features and ensemble approaches, perform well but… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries

    Tao Yan1, Javed Rashid2,3, Muhammad Shoaib Saleem3,4, Sajjad Ahmad4, Muhammad Faheem5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2685-2708, 2024, DOI:10.32604/cmc.2024.058186 - 18 November 2024

    Abstract Electricity is essential for keeping power networks balanced between supply and demand, especially since it costs a lot to store. The article talks about different deep learning methods that are used to guess how much green energy different Asian countries will produce. The main goal is to make reliable and accurate predictions that can help with the planning of new power plants to meet rising demand. There is a new deep learning model called the Green-electrical Production Ensemble (GP-Ensemble). It combines three types of neural networks: convolutional neural networks (CNNs), gated recurrent units (GRUs), and… More >

  • Open Access

    ARTICLE

    IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication

    Samsul Huda1,*, Yasuyuki Nogami2, Maya Rahayu2, Takuma Akada2, Md. Biplob Hossain2, Muhammad Bisri Musthafa2, Yang Jie2, Le Hoang Anh2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3165-3187, 2024, DOI:10.32604/cmc.2024.058144 - 18 November 2024

    Abstract Global food security is a pressing issue that affects the stability and well-being of communities worldwide. While existing Internet of Things (IoT) enabled plant monitoring systems have made significant strides in agricultural monitoring, they often face limitations such as high power consumption, restricted mobility, complex deployment requirements, and inadequate security measures for data access. This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings. Our system strategically combines power efficiency, portability, and secure access capabilities, assisting farmers in monitoring and tracking crop environmental conditions. The proposed system includes a… More >

  • Open Access

    ARTICLE

    Attribute Reduction on Decision Tables Based on Hausdorff Topology

    Nguyen Long Giang1, Tran Thanh Dai2, Le Hoang Son3, Tran Thi Ngan4, Nguyen Nhu Son1, Cu Nguyen Giap5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3097-3124, 2024, DOI:10.32604/cmc.2024.057383 - 18 November 2024

    Abstract Attribute reduction through the combined approach of Rough Sets (RS) and algebraic topology is an open research topic with significant potential for applications. Several research works have introduced a strong relationship between RS and topology spaces for the attribute reduction problem. However, the mentioned recent methods followed a strategy to construct a new measure for attribute selection. Meanwhile, the strategy for searching for the reduct is still to select each attribute and gradually add it to the reduct. Consequently, those methods tended to be inefficient for high-dimensional datasets. To overcome these challenges, we use the… More >

  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    Improved Double Deep Q Network Algorithm Based on Average Q-Value Estimation and Reward Redistribution for Robot Path Planning

    Yameng Yin1, Lieping Zhang2,*, Xiaoxu Shi1, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2769-2790, 2024, DOI:10.32604/cmc.2024.056791 - 18 November 2024

    Abstract By integrating deep neural networks with reinforcement learning, the Double Deep Q Network (DDQN) algorithm overcomes the limitations of Q-learning in handling continuous spaces and is widely applied in the path planning of mobile robots. However, the traditional DDQN algorithm suffers from sparse rewards and inefficient utilization of high-quality data. Targeting those problems, an improved DDQN algorithm based on average Q-value estimation and reward redistribution was proposed. First, to enhance the precision of the target Q-value, the average of multiple previously learned Q-values from the target Q network is used to replace the single Q-value… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

Displaying 1-10 on page 1 of 3016. Per Page