Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (280)
  • Open Access

    ARTICLE

    Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables

    Liang Chen1, Jingbo Zhang1, Linjie Wu1, Xingjuan Cai1,2,*, Yubin Xu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 363-383, 2024, DOI:10.32604/cmes.2024.049044

    Abstract The large-scale multi-objective optimization algorithm (LSMOA), based on the grouping of decision variables, is an advanced method for handling high-dimensional decision variables. However, in practical problems, the interaction among decision variables is intricate, leading to large group sizes and suboptimal optimization effects; hence a large-scale multi-objective optimization algorithm based on weighted overlapping grouping of decision variables (MOEAWOD) is proposed in this paper. Initially, the decision variables are perturbed and categorized into convergence and diversity variables; subsequently, the convergence variables are subdivided into groups based on the interactions among different decision variables. If the size of a group surpasses the set… More >

  • Open Access

    ARTICLE

    Decoupling Algorithms for the Gravitational Wave Spacecraft

    Xue Wang1,2, Weizhou Zhu1,2, Zhao Cui2,3, Xingguang Qian2,3, Jinke Yang1,2, Jianjun Jia1,2,*, Yikun Wang2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 325-337, 2024, DOI:10.32604/cmes.2024.048804

    Abstract The gravitational wave spacecraft is a complex multi-input multi-output dynamic system. The gravitational wave detection mission requires the spacecraft to achieve single spacecraft with two laser links and high-precision control. Establishing one spacecraft with two laser links, compared to one spacecraft with a single laser link, requires an upgraded decoupling algorithm for the link establishment. The decoupling algorithm we designed reassigns the degrees of freedom and forces in the control loop to ensure sufficient degrees of freedom for optical axis control. In addressing the distinct dynamic characteristics of different degrees of freedom, a transfer function compensation method is used in… More >

  • Open Access

    ARTICLE

    Uniaxial Compressive Strength Prediction for Rock Material in Deep Mine Using Boosting-Based Machine Learning Methods and Optimization Algorithms

    Junjie Zhao, Diyuan Li*, Jingtai Jiang, Pingkuang Luo

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 275-304, 2024, DOI:10.32604/cmes.2024.046960

    Abstract Traditional laboratory tests for measuring rock uniaxial compressive strength (UCS) are tedious and time-consuming. There is a pressing need for more effective methods to determine rock UCS, especially in deep mining environments under high in-situ stress. Thus, this study aims to develop an advanced model for predicting the UCS of rock material in deep mining environments by combining three boosting-based machine learning methods with four optimization algorithms. For this purpose, the Lead-Zinc mine in Southwest China is considered as the case study. Rock density, P-wave velocity, and point load strength index are used as input variables, and UCS is regarded… More > Graphic Abstract

    Uniaxial Compressive Strength Prediction for Rock Material in Deep Mine Using Boosting-Based Machine Learning Methods and Optimization Algorithms

  • Open Access

    ARTICLE

    A Novel 6G Scalable Blockchain Clustering-Based Computer Vision Character Detection for Mobile Images

    Yuejie Li1,2,*, Shijun Li3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3041-3070, 2024, DOI:10.32604/cmc.2023.045741

    Abstract 6G is envisioned as the next generation of wireless communication technology, promising unprecedented data speeds, ultra-low Latency, and ubiquitous Connectivity. In tandem with these advancements, blockchain technology is leveraged to enhance computer vision applications’ security, trustworthiness, and transparency. With the widespread use of mobile devices equipped with cameras, the ability to capture and recognize Chinese characters in natural scenes has become increasingly important. Blockchain can facilitate privacy-preserving mechanisms in applications where privacy is paramount, such as facial recognition or personal healthcare monitoring. Users can control their visual data and grant or revoke access as needed. Recognizing Chinese characters from images… More >

  • Open Access

    ARTICLE

    Test Case Generation Evaluator for the Implementation of Test Case Generation Algorithms Based on Learning to Rank

    Zhonghao Guo*, Xinyue Xu, Xiangxian Chen

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 479-509, 2024, DOI:10.32604/csse.2023.043932

    Abstract In software testing, the quality of test cases is crucial, but manual generation is time-consuming. Various automatic test case generation methods exist, requiring careful selection based on program features. Current evaluation methods compare a limited set of metrics, which does not support a larger number of metrics or consider the relative importance of each metric to the final assessment. To address this, we propose an evaluation tool, the Test Case Generation Evaluator (TCGE), based on the learning to rank (L2R) algorithm. Unlike previous approaches, our method comprehensively evaluates algorithms by considering multiple metrics, resulting in a more reasoned assessment. The… More >

  • Open Access

    ARTICLE

    Prediction of Ground Vibration Induced by Rock Blasting Based on Optimized Support Vector Regression Models

    Yifan Huang1, Zikang Zhou1,2, Mingyu Li1, Xuedong Luo1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3147-3165, 2024, DOI:10.32604/cmes.2024.045947

    Abstract Accurately estimating blasting vibration during rock blasting is the foundation of blasting vibration management. In this study, Tuna Swarm Optimization (TSO), Whale Optimization Algorithm (WOA), and Cuckoo Search (CS) were used to optimize two hyperparameters in support vector regression (SVR). Based on these methods, three hybrid models to predict peak particle velocity (PPV) for bench blasting were developed. Eighty-eight samples were collected to establish the PPV database, eight initial blasting parameters were chosen as input parameters for the prediction model, and the PPV was the output parameter. As predictive performance evaluation indicators, the coefficient of determination (R2), root mean square… More >

  • Open Access

    ARTICLE

    An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms

    Asma Hassan Alshehri*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2767-2786, 2024, DOI:10.32604/cmc.2023.046838

    Abstract Online review platforms are becoming increasingly popular, encouraging dishonest merchants and service providers to deceive customers by creating fake reviews for their goods or services. Using Sybil accounts, bot farms, and real account purchases, immoral actors demonize rivals and advertise their goods. Most academic and industry efforts have been aimed at detecting fake/fraudulent product or service evaluations for years. The primary hurdle to identifying fraudulent reviews is the lack of a reliable means to distinguish fraudulent reviews from real ones. This paper adopts a semi-supervised machine learning method to detect fake reviews on any website, among other things. Online reviews… More >

  • Open Access

    ARTICLE

    Machine Learning Security Defense Algorithms Based on Metadata Correlation Features

    Ruchun Jia, Jianwei Zhang*, Yi Lin

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2391-2418, 2024, DOI:10.32604/cmc.2024.044149

    Abstract With the popularization of the Internet and the development of technology, cyber threats are increasing day by day. Threats such as malware, hacking, and data breaches have had a serious impact on cybersecurity. The network security environment in the era of big data presents the characteristics of large amounts of data, high diversity, and high real-time requirements. Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats. This paper proposes a machine-learning security defense algorithm based on metadata association features. Emphasize control over unauthorized users through privacy, integrity, and availability. The… More >

  • Open Access

    ARTICLE

    Rao Algorithms-Based Structure Optimization for Heterogeneous Wireless Sensor Networks

    Shereen K. Refaay1, Samia A. Ali2, Moumen T. El-Melegy2, Louai A. Maghrabi3, Hamdy H. El-Sayed1,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 873-897, 2024, DOI:10.32604/cmc.2023.044982

    Abstract The structural optimization of wireless sensor networks is a critical issue because it impacts energy consumption and hence the network’s lifetime. Many studies have been conducted for homogeneous networks, but few have been performed for heterogeneous wireless sensor networks. This paper utilizes Rao algorithms to optimize the structure of heterogeneous wireless sensor networks according to node locations and their initial energies. The proposed algorithms lack algorithm-specific parameters and metaphorical connotations. The proposed algorithms examine the search space based on the relations of the population with the best, worst, and randomly assigned solutions. The proposed algorithms can be evaluated using any… More >

  • Open Access

    ARTICLE

    Intelligent Solution System for Cloud Security Based on Equity Distribution: Model and Algorithms

    Sarah Mustafa Eljack1,*, Mahdi Jemmali2,3,4, Mohsen Denden6,7, Mutasim Al Sadig1, Abdullah M. Algashami1, Sadok Turki5

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1461-1479, 2024, DOI:10.32604/cmc.2023.040919

    Abstract In the cloud environment, ensuring a high level of data security is in high demand. Data planning storage optimization is part of the whole security process in the cloud environment. It enables data security by avoiding the risk of data loss and data overlapping. The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient. In our work, we propose a data scheduling model for the cloud environment. The model is made up of three parts that together help dispatch user data flow to the appropriate cloud VMs. The first component is the… More >

Displaying 1-10 on page 1 of 280. Per Page