Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,919)
  • Open Access

    ARTICLE

    Enhanced Deep Reinforcement Learning Strategy for Energy Management in Plug-in Hybrid Electric Vehicles with Entropy Regularization and Prioritized Experience Replay

    Li Wang1,*, Xiaoyong Wang2

    Energy Engineering, Vol.121, No.12, pp. 3953-3979, 2024, DOI:10.32604/ee.2024.056705 - 22 November 2024

    Abstract Plug-in Hybrid Electric Vehicles (PHEVs) represent an innovative breed of transportation, harnessing diverse power sources for enhanced performance. Energy management strategies (EMSs) that coordinate and control different energy sources is a critical component of PHEV control technology, directly impacting overall vehicle performance. This study proposes an improved deep reinforcement learning (DRL)-based EMS that optimizes real-time energy allocation and coordinates the operation of multiple power sources. Conventional DRL algorithms struggle to effectively explore all possible state-action combinations within high-dimensional state and action spaces. They often fail to strike an optimal balance between exploration and exploitation, and… More >

  • Open Access

    ARTICLE

    Machine Learning-Driven Classification for Enhanced Rule Proposal Framework

    B. Gomathi1,*, R. Manimegalai1, Srivatsan Santhanam2, Atreya Biswas3

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1749-1765, 2024, DOI:10.32604/csse.2024.056659 - 22 November 2024

    Abstract In enterprise operations, maintaining manual rules for enterprise processes can be expensive, time-consuming, and dependent on specialized domain knowledge in that enterprise domain. Recently, rule-generation has been automated in enterprises, particularly through Machine Learning, to streamline routine tasks. Typically, these machine models are black boxes where the reasons for the decisions are not always transparent, and the end users need to verify the model proposals as a part of the user acceptance testing to trust it. In such scenarios, rules excel over Machine Learning models as the end-users can verify the rules and have more… More >

  • Open Access

    ARTICLE

    An Expert System to Detect Political Arabic Articles Orientation Using CatBoost Classifier Boosted by Multi-Level Features

    Saad M. Darwish1,*, Abdul Rahman M. Sabri2, Dhafar Hamed Abd2, Adel A. Elzoghabi1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1595-1624, 2024, DOI:10.32604/csse.2024.054615 - 22 November 2024

    Abstract The number of blogs and other forms of opinionated online content has increased dramatically in recent years. Many fields, including academia and national security, place an emphasis on automated political article orientation detection. Political articles (especially in the Arab world) are different from other articles due to their subjectivity, in which the author’s beliefs and political affiliation might have a significant influence on a political article. With categories representing the main political ideologies, this problem may be thought of as a subset of the text categorization (classification). In general, the performance of machine learning models… More >

  • Open Access

    REVIEW

    A Survey of Lung Nodules Detection and Classification from CT Scan Images

    Salman Ahmed1, Fazli Subhan2,3, Mazliham Mohd Su’ud3,*, Muhammad Mansoor Alam3,4, Adil Waheed5

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1483-1511, 2024, DOI:10.32604/csse.2024.053997 - 22 November 2024

    Abstract In the contemporary era, the death rate is increasing due to lung cancer. However, technology is continuously enhancing the quality of well-being. To improve the survival rate, radiologists rely on Computed Tomography (CT) scans for early detection and diagnosis of lung nodules. This paper presented a detailed, systematic review of several identification and categorization techniques for lung nodules. The analysis of the report explored the challenges, advancements, and future opinions in computer-aided diagnosis CAD systems for detecting and classifying lung nodules employing the deep learning (DL) algorithm. The findings also highlighted the usefulness of DL… More >

  • Open Access

    ARTICLE

    Attribute Reduction on Decision Tables Based on Hausdorff Topology

    Nguyen Long Giang1, Tran Thanh Dai2, Le Hoang Son3, Tran Thi Ngan4, Nguyen Nhu Son1, Cu Nguyen Giap5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3097-3124, 2024, DOI:10.32604/cmc.2024.057383 - 18 November 2024

    Abstract Attribute reduction through the combined approach of Rough Sets (RS) and algebraic topology is an open research topic with significant potential for applications. Several research works have introduced a strong relationship between RS and topology spaces for the attribute reduction problem. However, the mentioned recent methods followed a strategy to construct a new measure for attribute selection. Meanwhile, the strategy for searching for the reduct is still to select each attribute and gradually add it to the reduct. Consequently, those methods tended to be inefficient for high-dimensional datasets. To overcome these challenges, we use the… More >

  • Open Access

    ARTICLE

    Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems

    Ting Chen1, Shuna Jiang2, Xin Fan3,*, Jianchuan Xia2, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2195-2217, 2024, DOI:10.32604/cmc.2024.056960 - 18 November 2024

    Abstract In blockchain-based unmanned aerial vehicle (UAV) communication systems, the length of a block affects the performance of the blockchain. The transmission performance of blocks in the form of finite character segments is also affected by the block length. Therefore, it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems, especially in wireless environments involving UAVs. This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission. In our scheme, using a friendly jamming UAV… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    ARTICLE

    Dynamic Deep Learning for Enhanced Reliability in Wireless Sensor Networks: The DTLR-Net Approach

    Gajjala Savithri1,2, N. Raghavendra Sai1,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2547-2569, 2024, DOI:10.32604/cmc.2024.055827 - 18 November 2024

    Abstract In the world of wireless sensor networks (WSNs), optimizing performance and extending network lifetime are critical goals. In this paper, we propose a new model called DTLR-Net (Deep Temporal LSTM Regression Network) that employs long-short-term memory and is effective for long-term dependencies. Mobile sinks can move in arbitrary patterns, so the model employs long short-term memory (LSTM) networks to handle such movements. The parameters were initialized iteratively, and each node updated its position, mobility level, and other important metrics at each turn, with key measurements including active or inactive node ratio, energy consumption per cycle,… More >

  • Open Access

    REVIEW

    First Principles Calculations for Corrosion in Mg-Li-Al Alloys with Focus on Corrosion Resistance: A Comprehensive Review

    Muhammad Abdullah Khan1, Muhammad Usman2, Yuhong Zhao1,3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1905-1952, 2024, DOI:10.32604/cmc.2024.054691 - 18 November 2024

    Abstract This comprehensive review examines the structural, mechanical, electronic, and thermodynamic properties of Mg-Li-Al alloys, focusing on their corrosion resistance and mechanical performance enhancement. Utilizing first-principles calculations based on Density Functional Theory (DFT) and the quasi-harmonic approximation (QHA), the combined properties of the Mg-Li-Al phase are explored, revealing superior incompressibility, shear resistance, and stiffness compared to individual elements. The review highlights the brittleness of the alloy, supported by B/G ratios, Cauchy pressures, and Poisson’s ratios. Electronic structure analysis shows metallic behavior with varied covalent bonding characteristics, while Mulliken population analysis emphasizes significant electron transfer within the… More >

  • Open Access

    ARTICLE

    A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography

    Jiajun Liu1, Lina Tan1,*, Zhili Zhou2, Weijin Jiang1, Yi Li1, Peng Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3221-3240, 2024, DOI:10.32604/cmc.2024.054542 - 18 November 2024

    Abstract Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data. One issue with these methods is that as the steganographic capacity increases, the number of images stored in the database grows exponentially. This makes it challenging to build and manage a large image database. To improve the image library utilization and anti-attack capability of the steganography system, we propose an efficient coverless scheme based on dynamically matched substrings. We utilize You Only Look Once (YOLO) for selecting optimal objects and create a mapping dictionary between these objects and scrambling factors.… More >

Displaying 1-10 on page 1 of 1919. Per Page