Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,025)
  • Open Access

    ARTICLE

    Unleashing User Requirements from Social Media Networks by Harnessing the Deep Sentiment Analytics

    Deema Mohammed Alsekait1,*, Asif Nawaz2, Ayman Nabil3, Mehwish Bukhari2, Diaa Salama AbdElminaam3,4,5,6,*

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1031-1054, 2024, DOI:10.32604/csse.2024.051847

    Abstract The article describes a novel method for sentiment analysis and requirement elicitation from social media feedback, leveraging advanced machine learning techniques. This innovative approach automates the extraction and classification of user requirements by analyzing sentiment in data gathered from social media platforms such as Twitter and Facebook. Utilizing APIs (Application Programming Interface) for data collection and Graph-based Neural Networks (GNN) for feature extraction, the proposed model efficiently processes and analyzes large volumes of unstructured user-generated content. The preprocessing pipeline includes data cleaning, normalization, and tokenization, ensuring high-quality input for the sentiment analysis model. By classifying… More >

  • Open Access

    ARTICLE

    Deep Learning: A Theoretical Framework with Applications in Cyberattack Detection

    Kaveh Heidary*

    Journal on Artificial Intelligence, Vol.6, pp. 153-175, 2024, DOI:10.32604/jai.2024.050563

    Abstract This paper provides a detailed mathematical model governing the operation of feedforward neural networks (FFNN) and derives the backpropagation formulation utilized in the training process. Network protection systems must ensure secure access to the Internet, reliability of network services, consistency of applications, safeguarding of stored information, and data integrity while in transit across networks. The paper reports on the application of neural networks (NN) and deep learning (DL) analytics to the detection of network traffic anomalies, including network intrusions, and the timely prevention and mitigation of cyberattacks. Among the most prevalent cyber threats are R2L,… More >

  • Open Access

    ARTICLE

    Intrusion Detection System for Smart Industrial Environments with Ensemble Feature Selection and Deep Convolutional Neural Networks

    Asad Raza1,*, Shahzad Memon1, Muhammad Ali Nizamani1, Mahmood Hussain Shah2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 545-566, 2024, DOI:10.32604/iasc.2024.051779

    Abstract Smart Industrial environments use the Industrial Internet of Things (IIoT) for their routine operations and transform their industrial operations with intelligent and driven approaches. However, IIoT devices are vulnerable to cyber threats and exploits due to their connectivity with the internet. Traditional signature-based IDS are effective in detecting known attacks, but they are unable to detect unknown emerging attacks. Therefore, there is the need for an IDS which can learn from data and detect new threats. Ensemble Machine Learning (ML) and individual Deep Learning (DL) based IDS have been developed, and these individual models achieved… More >

  • Open Access

    ARTICLE

    Multi-Scale Location Attention Model for Spatio-Temporal Prediction of Disease Incidence

    Youshen Jiang1, Tongqing Zhou1, Zhilin Wang2, Zhiping Cai1,*, Qiang Ni3

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 585-597, 2024, DOI:10.32604/iasc.2023.030221

    Abstract Due to the increasingly severe challenges brought by various epidemic diseases, people urgently need intelligent outbreak trend prediction. Predicting disease onset is very important to assist decision-making. Most of the existing work fails to make full use of the temporal and spatial characteristics of epidemics, and also relies on multivariate data for prediction. In this paper, we propose a Multi-Scale Location Attention Graph Neural Networks (MSLAGNN) based on a large number of Centers for Disease Control and Prevention (CDC) patient electronic medical records research sequence source data sets. In order to understand the geography and… More >

  • Open Access

    ARTICLE

    Quantifying Uncertainty in Dielectric Solids’ Mechanical Properties Using Isogeometric Analysis and Conditional Generative Adversarial Networks

    Shuai Li1, Xiaodong Zhao1,2,*, Jinghu Zhou1, Xiyue Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2587-2611, 2024, DOI:10.32604/cmes.2024.052203

    Abstract Accurate quantification of the uncertainty in the mechanical characteristics of dielectric solids is crucial for advancing their application in high-precision technological domains, necessitating the development of robust computational methods. This paper introduces a Conditional Generation Adversarial Network Isogeometric Analysis (CGAN-IGA) to assess the uncertainty of dielectric solids’ mechanical characteristics. IGA is utilized for the precise computation of electric potentials in dielectric, piezoelectric, and flexoelectric materials, leveraging its advantage of integrating seamlessly with Computer-Aided Design (CAD) models to maintain exact geometrical fidelity. The CGAN method is highly efficient in generating models for piezoelectric and flexoelectric materials, More >

  • Open Access

    ARTICLE

    In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration

    Jihoon Sung1, Yeunwoong Kyung2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2891-2911, 2024, DOI:10.32604/cmes.2024.051772

    Abstract Industrial wireless mesh networks (WMNs) have been widely deployed in various industrial sectors, providing services such as manufacturing process monitoring, equipment control, and sensor data collection. A notable characteristic of industrial WMNs is their distinct traffic pattern, where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways. In this context, this paper adopts and revisits a routing algorithm known as ALFA (autonomous load-balancing field-based anycast routing), tailored specifically for anycast (one-to-one-of-many) networking in WMNs, where traffic flows can be served through any one of multiple gateways. In essence, the… More >

  • Open Access

    ARTICLE

    Computational Fluid Dynamics Approach for Predicting Pipeline Response to Various Blast Scenarios: A Numerical Modeling Study

    Farman Saifi1,*, Mohd Javaid1, Abid Haleem1, S. M. Anas2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2747-2777, 2024, DOI:10.32604/cmes.2024.051490

    Abstract Recent industrial explosions globally have intensified the focus in mechanical engineering on designing infrastructure systems and networks capable of withstanding blast loading. Initially centered on high-profile facilities such as embassies and petrochemical plants, this concern now extends to a wider array of infrastructures and facilities. Engineers and scholars increasingly prioritize structural safety against explosions, particularly to prevent disproportionate collapse and damage to nearby structures. Urbanization has further amplified the reliance on oil and gas pipelines, making them vital for urban life and prime targets for terrorist activities. Consequently, there is a growing imperative for computational… More >

  • Open Access

    ARTICLE

    LSTM Based Neural Network Model for Anomaly Event Detection in Care-Independent Smart Homes

    Brij B. Gupta1,2,3,*, Akshat Gaurav4, Razaz Waheeb Attar5, Varsha Arya6,7, Ahmed Alhomoud8, Kwok Tai Chui9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2689-2706, 2024, DOI:10.32604/cmes.2024.050825

    Abstract This study introduces a long-short-term memory (LSTM)-based neural network model developed for detecting anomaly events in care-independent smart homes, focusing on the critical application of elderly fall detection. It balances the dataset using the Synthetic Minority Over-sampling Technique (SMOTE), effectively neutralizing bias to address the challenge of unbalanced datasets prevalent in time-series classification tasks. The proposed LSTM model is trained on the enriched dataset, capturing the temporal dependencies essential for anomaly recognition. The model demonstrated a significant improvement in anomaly detection, with an accuracy of 84%. The results, detailed in the comprehensive classification and confusion More >

  • Open Access

    ARTICLE

    GliomaCNN: An Effective Lightweight CNN Model in Assessment of Classifying Brain Tumor from Magnetic Resonance Images Using Explainable AI

    Md. Atiqur Rahman1, Mustavi Ibne Masum1, Khan Md Hasib2, M. F. Mridha3,*, Sultan Alfarhood4, Mejdl Safran4,*, Dunren Che5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2425-2448, 2024, DOI:10.32604/cmes.2024.050760

    Abstract Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality. This study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging (MRI). It focuses on distinguishing between Low-Grade Gliomas (LGG) and High-Grade Gliomas (HGG). LGGs are benign and typically manageable with surgical resection, while HGGs are malignant and more aggressive. The research introduces an innovative custom convolutional neural network (CNN) model, Glioma-CNN. GliomaCNN stands out as a lightweight CNN model compared to its predecessors. The research utilized the BraTS 2020 More >

  • Open Access

    REVIEW

    A Review and Bibliometric Analysis of the Current Studies for the 6G Networks

    Qusay M. Salih1,2,*, Md. Arafatur Rahman3, Ahmad Firdaus1, Mohammed Rajih Jassim4, Hasan Kahtan5, Jasni Mohamad Zain6, Ahmed Hussein Ali7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2165-2206, 2024, DOI:10.32604/cmes.2024.028132

    Abstract The race to develop the next generation of wireless networks, known as Sixth Generation (6G) wireless, which will be operational in 2030, has already begun. To realize its full potential over the next decade, 6G will undoubtedly necessitate additional improvements that integrate existing solutions with cutting-edge ones. However, the studies about 6G are mainly limited and scattered, whereas no bibliometric study covers the 6G field. Thus, this study aims to review, examine, and summarize existing studies and research activities in 6G. This study has examined the Scopus database through a bibliometric analysis of more than More > Graphic Abstract

    A Review and Bibliometric Analysis of the Current Studies for the 6G Networks

Displaying 1-10 on page 1 of 1025. Per Page