Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (991)
  • Open Access

    ARTICLE

    Production Capacity Prediction Method of Shale Oil Based on Machine Learning Combination Model

    Qin Qian1, Mingjing Lu1,2,*, Anhai Zhong1, Feng Yang1, Wenjun He1, Min Li1

    Energy Engineering, Vol.121, No.8, pp. 2167-2190, 2024, DOI:10.32604/ee.2024.049430

    Abstract The production capacity of shale oil reservoirs after hydraulic fracturing is influenced by a complex interplay involving geological characteristics, engineering quality, and well conditions. These relationships, nonlinear in nature, pose challenges for accurate description through physical models. While field data provides insights into real-world effects, its limited volume and quality restrict its utility. Complementing this, numerical simulation models offer effective support. To harness the strengths of both data-driven and model-driven approaches, this study established a shale oil production capacity prediction model based on a machine learning combination model. Leveraging fracturing development data from 236 wells… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    Intelligent Image Text Detection via Pixel Standard Deviation Representation

    Sana Sahar Guia1, Abdelkader Laouid1, Mohammad Hammoudeh2,*, Mostafa Kara1,3

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 915-935, 2024, DOI:10.32604/csse.2024.046414

    Abstract Artificial intelligence has been involved in several domains. Despite the advantages of using artificial intelligence techniques, some crucial limitations prevent them from being implemented in specific domains and locations. The accuracy, poor quality of gathered data, and processing time are considered major concerns in implementing machine learning techniques, certainly in low-end smart devices. This paper aims to introduce a novel pre-treatment technique dedicated to image text detection that uses the images’ pixel divergence and similarity to reduce the image size. Mitigating the image size while keeping its features improves the model training time with an… More >

  • Open Access

    ARTICLE

    Microarray Gene Expression Classification: An Efficient Feature Selection Using Hybrid Swarm Intelligence Algorithm

    Punam Gulande*, R. N. Awale

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 937-952, 2024, DOI:10.32604/csse.2024.046123

    Abstract The study of gene expression has emerged as a vital tool for cancer diagnosis and prognosis, particularly with the advent of microarray technology that enables the measurement of thousands of genes in a single sample. While this wealth of data offers invaluable insights for disease management, the high dimensionality poses a challenge for multiclass classification. In this context, selecting relevant features becomes essential to enhance classification model performance. Swarm Intelligence algorithms have proven effective in addressing this challenge, owing to their ability to navigate intricate, non-linear feature-class relationships. This paper introduces a novel hybrid swarm More >

  • Open Access

    ARTICLE

    Chaotic Elephant Herd Optimization with Machine Learning for Arabic Hate Speech Detection

    Badriyya B. Al-onazi1, Jaber S. Alzahrani2, Najm Alotaibi3, Hussain Alshahrani4, Mohamed Ahmed Elfaki4, Radwa Marzouk5, Heba Mohsen6, Abdelwahed Motwakel7,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 567-583, 2024, DOI:10.32604/iasc.2023.033835

    Abstract In recent years, the usage of social networking sites has considerably increased in the Arab world. It has empowered individuals to express their opinions, especially in politics. Furthermore, various organizations that operate in the Arab countries have embraced social media in their day-to-day business activities at different scales. This is attributed to business owners’ understanding of social media’s importance for business development. However, the Arabic morphology is too complicated to understand due to the availability of nearly 10,000 roots and more than 900 patterns that act as the basis for verbs and nouns. Hate speech… More >

  • Open Access

    REVIEW

    A Comprehensive Survey on Federated Learning in the Healthcare Area: Concept and Applications

    Deepak Upreti1, Eunmok Yang2, Hyunil Kim3,*, Changho Seo1,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2239-2274, 2024, DOI:10.32604/cmes.2024.048932

    Abstract Federated learning is an innovative machine learning technique that deals with centralized data storage issues while maintaining privacy and security. It involves constructing machine learning models using datasets spread across several data centers, including medical facilities, clinical research facilities, Internet of Things devices, and even mobile devices. The main goal of federated learning is to improve robust models that benefit from the collective knowledge of these disparate datasets without centralizing sensitive information, reducing the risk of data loss, privacy breaches, or data exposure. The application of federated learning in the healthcare industry holds significant promise More >

  • Open Access

    REVIEW

    Applications of Soft Computing Methods in Backbreak Assessment in Surface Mines: A Comprehensive Review

    Mojtaba Yari1,*, Manoj Khandelwal2, Payam Abbasi3, Evangelos I. Koutras4, Danial Jahed Armaghani5,*, Panagiotis G. Asteris4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2207-2238, 2024, DOI:10.32604/cmes.2024.048071

    Abstract Geo-engineering problems are known for their complexity and high uncertainty levels, requiring precise definitions, past experiences, logical reasoning, mathematical analysis, and practical insight to address them effectively. Soft Computing (SC) methods have gained popularity in engineering disciplines such as mining and civil engineering due to computer hardware and machine learning advancements. Unlike traditional hard computing approaches, SC models use soft values and fuzzy sets to navigate uncertain environments. This study focuses on the application of SC methods to predict backbreak, a common issue in blasting operations within mining and civil projects. Backbreak, which refers to More >

  • Open Access

    ARTICLE

    Optimizing Hybrid Fibre-Reinforced Polymer Bars Design: A Machine Learning Approach

    Aneel Manan1, Pu Zhang1,*, Shoaib Ahmad2, Jawad Ahmad2

    Journal of Polymer Materials, Vol.41, No.1, pp. 15-44, 2024, DOI:10.32604/jpm.2024.053859

    Abstract Fiber-reinforced polymer (FRP) bars are gaining popularity as an alternative to steel reinforcement due to their advantages such as corrosion resistance and high strength-to-weight ratio. However, FRP has a lower modulus of elasticity compared to steel. Therefore, special attention is required in structural design to address deflection related issues and ensure ductile failure. This research explores the use of machine learning algorithms such as gene expression programming (GEP) to develop a simple and effective equation for predicting the elastic modulus of hybrid fiber-reinforced polymer (HFPR) bars. A comprehensive database of 125 experimental results of HFPR… More >

  • Open Access

    ARTICLE

    Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems

    Marya Iqbal1, Yaser Hafeez1, Nabil Almashfi2, Amjad Alsirhani3, Faeiz Alserhani4, Sadia Ali1, Mamoona Humayun5,*, Muhammad Jamal6

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5031-5049, 2024, DOI:10.32604/cmc.2024.051371

    Abstract Embracing software product lines (SPLs) is pivotal in the dynamic landscape of contemporary software development. However, the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability, underscoring the critical importance of robust cybersecurity measures. This paper advocates for leveraging machine learning (ML) to address variability management issues and fortify the security of SPL. In the context of the broader special issue theme on innovative cybersecurity approaches, our proposed ML-based framework offers an interdisciplinary perspective, blending insights from computing, social sciences, and business. Specifically, it employs ML for demand analysis, More >

  • Open Access

    ARTICLE

    Transparent and Accountable Training Data Sharing in Decentralized Machine Learning Systems

    Siwan Noh1, Kyung-Hyune Rhee2,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3805-3826, 2024, DOI:10.32604/cmc.2024.050949

    Abstract In Decentralized Machine Learning (DML) systems, system participants contribute their resources to assist others in developing machine learning solutions. Identifying malicious contributions in DML systems is challenging, which has led to the exploration of blockchain technology. Blockchain leverages its transparency and immutability to record the provenance and reliability of training data. However, storing massive datasets or implementing model evaluation processes on smart contracts incurs high computational costs. Additionally, current research on preventing malicious contributions in DML systems primarily focuses on protecting models from being exploited by workers who contribute incorrect or misleading data. However, less… More >

Displaying 1-10 on page 1 of 991. Per Page