Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (80)
  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the dung beetle population, laying the… More >

  • Open Access

    ARTICLE

    A Weighted Multi-Layer Analytics Based Model for Emoji Recommendation

    Amira M. Idrees1,*, Abdul Lateef Marzouq Al-Solami2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1115-1133, 2024, DOI:10.32604/cmc.2023.046457

    Abstract The developed system for eye and face detection using Convolutional Neural Networks (CNN) models, followed by eye classification and voice-based assistance, has shown promising potential in enhancing accessibility for individuals with visual impairments. The modular approach implemented in this research allows for a seamless flow of information and assistance between the different components of the system. This research significantly contributes to the field of accessibility technology by integrating computer vision, natural language processing, and voice technologies. By leveraging these advancements, the developed system offers a practical and efficient solution for assisting blind individuals. The modular design ensures flexibility, scalability, and… More >

  • Open Access

    REVIEW

    Embracing the Future: AI and ML Transforming Urban Environments in Smart Cities

    Gagan Deep*, Jyoti Verma

    Journal on Artificial Intelligence, Vol.5, pp. 57-73, 2023, DOI:10.32604/jai.2023.043329

    Abstract This research explores the increasing importance of Artificial Intelligence (AI) and Machine Learning (ML) with relation to smart cities. It discusses the AI and ML’s ability to revolutionize various aspects of urban environments, including infrastructure, governance, public safety, and sustainability. The research presents the definition and characteristics of smart cities, highlighting the key components and technologies driving initiatives for smart cities. The methodology employed in this study involved a comprehensive review of relevant literature, research papers, and reports on the subject of AI and ML in smart cities. Various sources were consulted to gather information on the integration of AI… More >

  • Open Access

    ARTICLE

    Systematic Survey on Big Data Analytics and Artificial Intelligence for COVID-19 Containment

    Saeed M. Alshahrani1, Jameel Almalki2, Waleed Alshehri2, Rashid Mehmood3, Marwan Albahar2, Najlaa Jannah2, Nayyar Ahmed Khan1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1793-1817, 2023, DOI:10.32604/csse.2023.039648

    Abstract Artificial Intelligence (AI) has gained popularity for the containment of COVID-19 pandemic applications. Several AI techniques provide efficient mechanisms for handling pandemic situations. AI methods, protocols, data sets, and various validation mechanisms empower the users towards proper decision-making and procedures to handle the situation. Despite so many tools, there still exist conditions in which AI must go a long way. To increase the adaptability and potential of these techniques, a combination of AI and Bigdata is currently gaining popularity. This paper surveys and analyzes the methods within the various computational paradigms used by different researchers and national governments, such as… More >

  • Open Access

    ARTICLE

    Fuzzy Rule-Based Model to Train Videos in Video Surveillance System

    A. Manju1, A. Revathi2, M. Arivukarasi1, S. Hariharan3, V. Umarani4, Shih-Yu Chen5,*, Jin Wang6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 905-920, 2023, DOI:10.32604/iasc.2023.038444

    Abstract With the proliferation of the internet, big data continues to grow exponentially, and video has become the largest source. Video big data introduces many technological challenges, including compression, storage, transmission, analysis, and recognition. The increase in the number of multimedia resources has brought an urgent need to develop intelligent methods to organize and process them. The integration between Semantic link Networks and multimedia resources provides a new prospect for organizing them with their semantics. The tags and surrounding texts of multimedia resources are used to measure their semantic association. Two evaluation methods including clustering and retrieval are performed to measure… More >

  • Open Access

    ARTICLE

    Adaptive Kernel Firefly Algorithm Based Feature Selection and Q-Learner Machine Learning Models in Cloud

    I. Mettildha Mary1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2667-2685, 2023, DOI:10.32604/csse.2023.031114

    Abstract CC’s (Cloud Computing) networks are distributed and dynamic as signals appear/disappear or lose significance. MLTs (Machine learning Techniques) train datasets which sometime are inadequate in terms of sample for inferring information. A dynamic strategy, DevMLOps (Development Machine Learning Operations) used in automatic selections and tunings of MLTs result in significant performance differences. But, the scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. RFEs (Recursive Feature Eliminations) are computationally very expensive in its operations as it traverses through each feature without considering correlations between them. This problem can… More >

  • Open Access

    ARTICLE

    Reinforcing Artificial Neural Networks through Traditional Machine Learning Algorithms for Robust Classification of Cancer

    Muhammad Hammad Waseem1, Malik Sajjad Ahmed Nadeem1,*, Ishtiaq Rasool Khan2, Seong-O-Shim3, Wajid Aziz1, Usman Habib4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4293-4315, 2023, DOI:10.32604/cmc.2023.036710

    Abstract Machine Learning (ML)-based prediction and classification systems employ data and learning algorithms to forecast target values. However, improving predictive accuracy is a crucial step for informed decision-making. In the healthcare domain, data are available in the form of genetic profiles and clinical characteristics to build prediction models for complex tasks like cancer detection or diagnosis. Among ML algorithms, Artificial Neural Networks (ANNs) are considered the most suitable framework for many classification tasks. The network weights and the activation functions are the two crucial elements in the learning process of an ANN. These weights affect the prediction ability and the convergence… More >

  • Open Access

    ARTICLE

    Data Analytics on Unpredictable Pregnancy Data Records Using Ensemble Neuro-Fuzzy Techniques

    C. Vairavel1,*, N. S. Nithya2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2159-2175, 2023, DOI:10.32604/csse.2023.036598

    Abstract The immune system goes through a profound transformation during pregnancy, and certain unexpected maternal complications have been correlated to this transition. The ability to correctly examine, diagnoses, and predict pregnancy-hastened diseases via the available big data is a delicate problem since the range of information continuously increases and is scalable. Many approaches for disease diagnosis/classification have been established with the use of data mining concepts. However, such methods do not provide an appropriate classification/diagnosis model. Furthermore, single learning approaches are used to create the bulk of these systems. Classification issues may be made more accurate by combining predictions from many… More >

  • Open Access

    ARTICLE

    Power Scheduling with Max User Comfort in Smart Home: Performance Analysis and Tradeoffs

    Muhammad Irfan1, Ch. Anwar Ul Hassan2, Faisal Althobiani3, Nasir Ayub4,*, Raja Jalees Ul Hussen Khan5, Emad Ismat Ghandourah6, Majid A. Almas7, Saleh Mohammed Ghonaim3, V. R. Shamji3, Saifur Rahman1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1723-1740, 2023, DOI:10.32604/csse.2023.035141

    Abstract The smart grid has enabled users to control their home energy more effectively and efficiently. A home energy management system (HEM) is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy. Here, we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm (GWA) and Harmony Search Algorithms (HSA). Moreover, a fusion initiated on HSA and GWA operators is used to optimize energy intake. Furthermore, many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge. Hybridization has proven beneficial in achieving numerous… More >

  • Open Access

    ARTICLE

    Modified Buffalo Optimization with Big Data Analytics Assisted Intrusion Detection Model

    R. Sheeba1,*, R. Sharmila2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1415-1429, 2023, DOI:10.32604/csse.2023.034321

    Abstract Lately, the Internet of Things (IoT) application requires millions of structured and unstructured data since it has numerous problems, such as data organization, production, and capturing. To address these shortcomings, big data analytics is the most superior technology that has to be adapted. Even though big data and IoT could make human life more convenient, those benefits come at the expense of security. To manage these kinds of threats, the intrusion detection system has been extensively applied to identify malicious network traffic, particularly once the preventive technique fails at the level of endpoint IoT devices. As cyberattacks targeting IoT have… More >

Displaying 1-10 on page 1 of 80. Per Page