Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1677-1709, 2024, DOI:10.32604/cmc.2024.049717

    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access

    ARTICLE

    Chaotic Elephant Herd Optimization with Machine Learning for Arabic Hate Speech Detection

    Badriyya B. Al-onazi1, Jaber S. Alzahrani2, Najm Alotaibi3, Hussain Alshahrani4, Mohamed Ahmed Elfaki4, Radwa Marzouk5, Heba Mohsen6, Abdelwahed Motwakel7,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 567-583, 2024, DOI:10.32604/iasc.2023.033835

    Abstract In recent years, the usage of social networking sites has considerably increased in the Arab world. It has empowered individuals to express their opinions, especially in politics. Furthermore, various organizations that operate in the Arab countries have embraced social media in their day-to-day business activities at different scales. This is attributed to business owners’ understanding of social media’s importance for business development. However, the Arabic morphology is too complicated to understand due to the availability of nearly 10,000 roots and more than 900 patterns that act as the basis for verbs and nouns. Hate speech… More >

  • Open Access

    ARTICLE

    Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing

    Mingliang Sun, Jie Yuan*, Xiaoyong Li, Dongxiao Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2625-2646, 2024, DOI:10.32604/cmc.2024.050337

    Abstract Images are the most important carrier of human information. Moreover, how to safely transmit digital images through public channels has become an urgent problem. In this paper, we propose a novel image encryption algorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiency of image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSE can fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks, such as differential attacks, and exhibit robustness. First, we use a sparse… More >

  • Open Access

    ARTICLE

    Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks (MANETS)

    Ahmed Alhussen1, Arshiya S. Ansari2,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1903-1923, 2024, DOI:10.32604/cmc.2024.049260

    Abstract Traffic in today’s cities is a serious problem that increases travel times, negatively affects the environment, and drains financial resources. This study presents an Artificial Intelligence (AI) augmented Mobile Ad Hoc Networks (MANETs) based real-time prediction paradigm for urban traffic challenges. MANETs are wireless networks that are based on mobile devices and may self-organize. The distributed nature of MANETs and the power of AI approaches are leveraged in this framework to provide reliable and timely traffic congestion forecasts. This study suggests a unique Chaotic Spatial Fuzzy Polynomial Neural Network (CSFPNN) technique to assess real-time data… More >

  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This… More >

  • Open Access

    ARTICLE

    Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells

    Chanumolu Kiran Kumar, Nandhakumar Ramachandran*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3151-3176, 2024, DOI:10.32604/cmc.2023.043534

    Abstract Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions, vulnerabilities, and assaults. Complex security systems, such as Intrusion Detection Systems (IDS), are essential due to the limitations of simpler security measures, such as cryptography and firewalls. Due to their compact nature and low energy reserves, wireless networks present a significant challenge for security procedures. The features of small cells can cause threats to the network. Network Coding (NC) enabled small cells are vulnerable to various types of attacks. Avoiding attacks and performing secure “peer” to “peer” data transmission is… More >

  • Open Access

    ARTICLE

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

    Zhuo Chen1,*, Ningning Wang2, Wenbo Jin3, Dui Li1

    Energy Engineering, Vol.121, No.4, pp. 1007-1026, 2024, DOI:10.32604/ee.2023.045270

    Abstract A hard problem that hinders the movement of waxy crude oil is wax deposition in oil pipelines. To ensure the safe operation of crude oil pipelines, an accurate model must be developed to predict the rate of wax deposition in crude oil pipelines. Aiming at the shortcomings of the ENN prediction model, which easily falls into the local minimum value and weak generalization ability in the implementation process, an optimized ENN prediction model based on the IRSA is proposed. The validity of the new model was confirmed by the accurate prediction of two sets of… More > Graphic Abstract

    Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm

  • Open Access

    ARTICLE

    CHAOTIC NATURAL CONVECTION IN AN ANNULAR CAVITY WITH NON-ISOTHERMAL WALLS

    H.E. Dillon, A.F. Emery, A.M. Mescher, O. Sprenger, S.R. Edwards

    Frontiers in Heat and Mass Transfer, Vol.2, No.2, pp. 1-14, 2011, DOI:10.5098/hmt.v2.2.3002

    Abstract The stability of free convection in an annulus is governed by the boundary conditions on the inner and outer walls of the annulus and the upper and lower boundaries. This paper explores the effect of free convection on the inner surface of the annulus, where the boundary conditions for the outer wall and the upper and lower boundaries are controlled. The temperature is measured in the center of the air cavity and just below the surface of the inner annular boundary. Experimental results are shown for a radius ratio of 0.40, aspect ratio of 20.7. More >

  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are More >

  • Open Access

    ARTICLE

    Prediction on Failure Pressure of Pipeline Containing Corrosion Defects Based on ISSA-BPNN Model

    Qi Zhuang1,*, Dong Liu2, Zhuo Chen3

    Energy Engineering, Vol.121, No.3, pp. 821-834, 2024, DOI:10.32604/ee.2023.044054

    Abstract Oil and gas pipelines are affected by many factors, such as pipe wall thinning and pipeline rupture. Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management. Aiming at the shortcomings of the BP Neural Network (BPNN) model, such as low learning efficiency, sensitivity to initial weights, and easy falling into a local optimal state, an Improved Sparrow Search Algorithm (ISSA) is adopted to optimize the initial weights and thresholds of BPNN, and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established. Taking 61 sets More >

Displaying 1-10 on page 1 of 92. Per Page