Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (629)
  • Open Access

    ARTICLE

    Enhanced Deep Reinforcement Learning Strategy for Energy Management in Plug-in Hybrid Electric Vehicles with Entropy Regularization and Prioritized Experience Replay

    Li Wang1,*, Xiaoyong Wang2

    Energy Engineering, Vol.121, No.12, pp. 3953-3979, 2024, DOI:10.32604/ee.2024.056705 - 22 November 2024

    Abstract Plug-in Hybrid Electric Vehicles (PHEVs) represent an innovative breed of transportation, harnessing diverse power sources for enhanced performance. Energy management strategies (EMSs) that coordinate and control different energy sources is a critical component of PHEV control technology, directly impacting overall vehicle performance. This study proposes an improved deep reinforcement learning (DRL)-based EMS that optimizes real-time energy allocation and coordinates the operation of multiple power sources. Conventional DRL algorithms struggle to effectively explore all possible state-action combinations within high-dimensional state and action spaces. They often fail to strike an optimal balance between exploration and exploitation, and… More >

  • Open Access

    ARTICLE

    Machine Learning-Driven Classification for Enhanced Rule Proposal Framework

    B. Gomathi1,*, R. Manimegalai1, Srivatsan Santhanam2, Atreya Biswas3

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1749-1765, 2024, DOI:10.32604/csse.2024.056659 - 22 November 2024

    Abstract In enterprise operations, maintaining manual rules for enterprise processes can be expensive, time-consuming, and dependent on specialized domain knowledge in that enterprise domain. Recently, rule-generation has been automated in enterprises, particularly through Machine Learning, to streamline routine tasks. Typically, these machine models are black boxes where the reasons for the decisions are not always transparent, and the end users need to verify the model proposals as a part of the user acceptance testing to trust it. In such scenarios, rules excel over Machine Learning models as the end-users can verify the rules and have more… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

  • Open Access

    ARTICLE

    Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking

    Hira Akhtar Butt1, Khoula Said Al Harthy2, Mumtaz Ali Shah3, Mudassar Hussain2,*, Rashid Amin4,*, Mujeeb Ur Rehman1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3003-3031, 2024, DOI:10.32604/cmc.2024.057185 - 18 November 2024

    Abstract Detecting sophisticated cyberattacks, mainly Distributed Denial of Service (DDoS) attacks, with unexpected patterns remains challenging in modern networks. Traditional detection systems often struggle to mitigate such attacks in conventional and software-defined networking (SDN) environments. While Machine Learning (ML) models can distinguish between benign and malicious traffic, their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent retraining. In this paper, we propose a novel DDoS detection framework that combines Machine Learning (ML) and Ensemble Learning (EL) techniques to improve DDoS attack detection and mitigation in SDN environments. Our model… More >

  • Open Access

    ARTICLE

    Position-Aware and Subgraph Enhanced Dynamic Graph Contrastive Learning on Discrete-Time Dynamic Graph

    Jian Feng*, Tian Liu, Cailing Du

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2895-2909, 2024, DOI:10.32604/cmc.2024.056434 - 18 November 2024

    Abstract Unsupervised learning methods such as graph contrastive learning have been used for dynamic graph representation learning to eliminate the dependence of labels. However, existing studies neglect positional information when learning discrete snapshots, resulting in insufficient network topology learning. At the same time, due to the lack of appropriate data augmentation methods, it is difficult to capture the evolving patterns of the network effectively. To address the above problems, a position-aware and subgraph enhanced dynamic graph contrastive learning method is proposed for discrete-time dynamic graphs. Firstly, the global snapshot is built based on the historical snapshots… More >

  • Open Access

    ARTICLE

    Enhanced Growth Optimizer and Its Application to Multispectral Image Fusion

    Jeng-Shyang Pan1,2, Wenda Li1, Shu-Chuan Chu1,*, Xiao Sui1, Junzo Watada3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3033-3062, 2024, DOI:10.32604/cmc.2024.056310 - 18 November 2024

    Abstract The growth optimizer (GO) is an innovative and robust metaheuristic optimization algorithm designed to simulate the learning and reflective processes experienced by individuals as they mature within the social environment. However, the original GO algorithm is constrained by two significant limitations: slow convergence and high memory requirements. This restricts its application to large-scale and complex problems. To address these problems, this paper proposes an innovative enhanced growth optimizer (eGO). In contrast to conventional population-based optimization algorithms, the eGO algorithm utilizes a probabilistic model, designated as the virtual population, which is capable of accurately replicating the… More >

  • Open Access

    ARTICLE

    Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach

    Gajjala Savithri1,2, N. Raghavendra Sai1,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2547-2569, 2024, DOI:10.32604/cmc.2024.055827 - 18 November 2024

    Abstract In the world of wireless sensor networks (WSNs), optimizing performance and extending network lifetime are critical goals. In this paper, we propose a new model called DTLR-Net (Deep Temporal LSTM Regression Network) that employs long-short-term memory and is effective for long-term dependencies. Mobile sinks can move in arbitrary patterns, so the model employs long short-term memory (LSTM) networks to handle such movements. The parameters were initialized iteratively, and each node updated its position, mobility level, and other important metrics at each turn, with key measurements including active or inactive node ratio, energy consumption per cycle,… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    ARTICLE

    An Enhanced Integrated Method for Healthcare Data Classification with Incompleteness

    Sonia Goel1,#, Meena Tushir1, Jyoti Arora2, Tripti Sharma2, Deepali Gupta3, Ali Nauman4,#, Ghulam Muhammad5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3125-3145, 2024, DOI:10.32604/cmc.2024.054476 - 18 November 2024

    Abstract In numerous real-world healthcare applications, handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification tasks. Traditional approaches often rely on statistical methods for imputation, which may yield suboptimal results and be computationally intensive. This paper aims to integrate imputation and clustering techniques to enhance the classification of incomplete medical data with improved accuracy. Conventional classification methods are ill-suited for incomplete medical data. To enhance efficiency without compromising accuracy, this paper introduces a novel approach that combines imputation and clustering for the classification of incomplete data. Initially, the linear More >

  • Open Access

    PROCEEDINGS

    Hybrid Artificial Muscle: Enhanced Actuation and Load-Bearing Performance via an Origami Metamaterial Endoskeleton

    Ting Tan1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.012670

    Abstract Owing to their compliance, soft robots demonstrate enhanced compatibility with humans and the environment compared with traditional rigid robots. However, ensuring the working effectiveness of artificial muscles that actuate soft robots in confined spaces or underloaded conditions remains a challenge. Drawing inspiration from avian pneumatic bones, we propose the incorporation of a light weight endoskeleton into artificial muscles to augment the mechanical integrity and tackle load-bearing environmental difficulties. We present a soft origami hybrid artificial muscle that features a hollow origami metamaterial interior with a rolled dielectric elastomer exterior. The programmable nonlinear origami metamaterial endoskeleton More >

Displaying 1-10 on page 1 of 629. Per Page