Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,538)
  • Open Access

    ARTICLE

    Support Vector Machine (SVM) and Object Based Classification in Earth Linear Features Extraction: A Comparison

    Siti Aekbal Salleh1,2,*, Nafisah Khalid1, Natasha Danny6, Nurul Ain Mohd. Zaki2,3, Mustafa Ustuner4, Zulkiflee Abd Latif1,2, Vladimir Foronda5

    Revue Internationale de Géomatique, Vol.33, pp. 183-199, 2024, DOI:10.32604/rig.2024.050723

    Abstract Due to the spectral and spatial properties of pervious and impervious surfaces, image classification and information extraction in detailed, small-scale mapping of urban surface materials is quite difficult and complex. Emerging methods and innovations in image classification have centred on object-based classification techniques and various segmentation techniques, which are fundamental to this approach. Consequently, the purpose of this study is to determine which classification method is most suitable for extracting linear features in terms of techniques and performance by comparing two classification methods, pixel-based approach and object-based approach, using WorldView-2 satellite imagery to specifically highlight… More > Graphic Abstract

    Support Vector Machine (SVM) and Object Based Classification in Earth Linear Features Extraction: A Comparison

  • Open Access

    ARTICLE

    Optimizing Hybrid Fibre-Reinforced Polymer Bars Design: A Machine Learning Approach

    Aneel Manan1, Pu Zhang1,*, Shoaib Ahmad2, Jawad Ahmad2

    Journal of Polymer Materials, Vol.41, No.1, pp. 15-44, 2024, DOI:10.32604/jpm.2024.053859

    Abstract Fiber-reinforced polymer (FRP) bars are gaining popularity as an alternative to steel reinforcement due to their advantages such as corrosion resistance and high strength-to-weight ratio. However, FRP has a lower modulus of elasticity compared to steel. Therefore, special attention is required in structural design to address deflection related issues and ensure ductile failure. This research explores the use of machine learning algorithms such as gene expression programming (GEP) to develop a simple and effective equation for predicting the elastic modulus of hybrid fiber-reinforced polymer (HFPR) bars. A comprehensive database of 125 experimental results of HFPR… More >

  • Open Access

    ARTICLE

    Learning Vector Quantization-Based Fuzzy Rules Oversampling Method

    Jiqiang Chen, Ranran Han, Dongqing Zhang, Litao Ma*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5067-5082, 2024, DOI:10.32604/cmc.2024.051494

    Abstract Imbalanced datasets are common in practical applications, and oversampling methods using fuzzy rules have been shown to enhance the classification performance of imbalanced data by taking into account the relationship between data attributes. However, the creation of fuzzy rules typically depends on expert knowledge, which may not fully leverage the label information in training data and may be subjective. To address this issue, a novel fuzzy rule oversampling approach is developed based on the learning vector quantization (LVQ) algorithm. In this method, the label information of the training data is utilized to determine the antecedent… More >

  • Open Access

    ARTICLE

    Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems

    Marya Iqbal1, Yaser Hafeez1, Nabil Almashfi2, Amjad Alsirhani3, Faeiz Alserhani4, Sadia Ali1, Mamoona Humayun5,*, Muhammad Jamal6

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5031-5049, 2024, DOI:10.32604/cmc.2024.051371

    Abstract Embracing software product lines (SPLs) is pivotal in the dynamic landscape of contemporary software development. However, the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability, underscoring the critical importance of robust cybersecurity measures. This paper advocates for leveraging machine learning (ML) to address variability management issues and fortify the security of SPL. In the context of the broader special issue theme on innovative cybersecurity approaches, our proposed ML-based framework offers an interdisciplinary perspective, blending insights from computing, social sciences, and business. Specifically, it employs ML for demand analysis, More >

  • Open Access

    ARTICLE

    Weak Fault Feature Extraction of the Rotating Machinery Using Flexible Analytic Wavelet Transform and Nonlinear Quantum Permutation Entropy

    Lili Bai1,*, Wenhui Li1, He Ren1,2, Feng Li1, Tao Yan1, Lirong Chen3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4513-4531, 2024, DOI:10.32604/cmc.2024.051348

    Abstract Addressing the challenges posed by the nonlinear and non-stationary vibrations in rotating machinery, where weak fault characteristic signals hinder accurate fault state representation, we propose a novel feature extraction method that combines the Flexible Analytic Wavelet Transform (FAWT) with Nonlinear Quantum Permutation Entropy. FAWT, leveraging fractional orders and arbitrary scaling and translation factors, exhibits superior translational invariance and adjustable fundamental oscillatory characteristics. This flexibility enables FAWT to provide well-suited wavelet shapes, effectively matching subtle fault components and avoiding performance degradation associated with fixed frequency partitioning and low-oscillation bases in detecting weak faults. In our approach,… More >

  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

  • Open Access

    ARTICLE

    CNN Channel Attention Intrusion Detection System Using NSL-KDD Dataset

    Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4319-4347, 2024, DOI:10.32604/cmc.2024.050586

    Abstract Intrusion detection systems (IDS) are essential in the field of cybersecurity because they protect networks from a wide range of online threats. The goal of this research is to meet the urgent need for small-footprint, highly-adaptable Network Intrusion Detection Systems (NIDS) that can identify anomalies. The NSL-KDD dataset is used in the study; it is a sizable collection comprising 43 variables with the label’s “attack” and “level.” It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks (CNN). Furthermore, this dataset makes it easier to conduct… More >

  • Open Access

    ARTICLE

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

    Yi-Chun Lai1, Shu-Yin Chiang2, Yao-Chiang Kan3, Hsueh-Chun Lin4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3783-3803, 2024, DOI:10.32604/cmc.2024.050376

    Abstract Artificial intelligence (AI) technology has become integral in the realm of medicine and healthcare, particularly in human activity recognition (HAR) applications such as fitness and rehabilitation tracking. This study introduces a robust coupling analysis framework that integrates four AI-enabled models, combining both machine learning (ML) and deep learning (DL) approaches to evaluate their effectiveness in HAR. The analytical dataset comprises 561 features sourced from the UCI-HAR database, forming the foundation for training the models. Additionally, the MHEALTH database is employed to replicate the modeling process for comparative purposes, while inclusion of the WISDM database, renowned… More > Graphic Abstract

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

  • Open Access

    ARTICLE

    Research on the IL-Bagging-DHKELM Short-Term Wind Power Prediction Algorithm Based on Error AP Clustering Analysis

    Jing Gao*, Mingxuan Ji, Hongjiang Wang, Zhongxiao Du

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5017-5030, 2024, DOI:10.32604/cmc.2024.050158

    Abstract With the continuous advancement of China’s “peak carbon dioxide emissions and Carbon Neutrality” process, the proportion of wind power is increasing. In the current research, aiming at the problem that the forecasting model is outdated due to the continuous updating of wind power data, a short-term wind power forecasting algorithm based on Incremental Learning-Bagging Deep Hybrid Kernel Extreme Learning Machine (IL-Bagging-DHKELM) error affinity propagation cluster analysis is proposed. The algorithm effectively combines deep hybrid kernel extreme learning machine (DHKELM) with incremental learning (IL). Firstly, an initial wind power prediction model is trained using the Bagging-DHKELM… More >

  • Open Access

    ARTICLE

    EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems

    Zhenjiang Dong1, Xin Ge1, Yuehua Huang1, Jiankuo Dong1, Jiang Xu2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4021-4044, 2024, DOI:10.32604/cmc.2024.049233

    Abstract This paper presents a comprehensive exploration into the integration of Internet of Things (IoT), big data analysis, cloud computing, and Artificial Intelligence (AI), which has led to an unprecedented era of connectivity. We delve into the emerging trend of machine learning on embedded devices, enabling tasks in resource-limited environments. However, the widespread adoption of machine learning raises significant privacy concerns, necessitating the development of privacy-preserving techniques. One such technique, secure multi-party computation (MPC), allows collaborative computations without exposing private inputs. Despite its potential, complex protocols and communication interactions hinder performance, especially on resource-constrained devices. Efforts… More >

Displaying 1-10 on page 1 of 1538. Per Page