Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    A New Reward System Based on Human Demonstrations for Hard Exploration Games

    Wadhah Zeyad Tareq*, Mehmet Fatih Amasyali

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2401-2414, 2022, DOI:10.32604/cmc.2022.020036

    Abstract The main idea of reinforcement learning is evaluating the chosen action depending on the current reward. According to this concept, many algorithms achieved proper performance on classic Atari 2600 games. The main challenge is when the reward is sparse or missing. Such environments are complex exploration environments like Montezuma’s Revenge, Pitfall, and Private Eye games. Approaches built to deal with such challenges were very demanding. This work introduced a different reward system that enables the simple classical algorithm to learn fast and achieve high performance in hard exploration environments. Moreover, we added some simple enhancements to several hyperparameters, such as… More >

  • Open Access

    ARTICLE

    Proxy-Based Hierarchical Distributed Mobility Management for Tactical Networks

    Myoung-hun Han1,2, Bong-Soo Roh1, Kyungwoo Kim1, Dae-Hoon Kwon1, Jae-Hyun Ham1, KyungHyun Yoon2, Sanghyun Seo3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2381-2399, 2022, DOI:10.32604/cmc.2022.020029

    Abstract An important requirement in a military domain is a highly reliable mobility management method, especially when components of the networks are moving in tactical network environments. To increase reliability, the mobility management technology of the tactical network should be able to reflect the characteristics of the tactical network, such as a limited environment, failure, and hierarchical unit structure. In this paper, we propose a proxy-based hierarchical distributed mobility management scheme, which is highly focused on tactical networks. Considering the characteristics of tactical networks, the proposed scheme is composed of the following: 1) a proxy-based method, 2) a distributed mobility management… More >

  • Open Access

    ARTICLE

    A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare

    Tallat Jabeen1,2, Ishrat Jabeen1, Humaira Ashraf2, Nz Jhanjhi3,*, Mamoona Humayun4, Mehedi Masud5, Sultan Aljahdali5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2365-2380, 2022, DOI:10.32604/cmc.2022.020016

    Abstract COVID-19 is a novel coronavirus disease that has been declared as a global pandemic in 2019. It affects the whole world through person-to-person communication. This virus spreads by the droplets of coughs and sneezing, which are quickly falling over the surface. Therefore, anyone can get easily affected by breathing in the vicinity of the COVID-19 patient. Currently, vaccine for the disease is under clinical investigation in different pharmaceutical companies. Until now, multiple medical companies have delivered health monitoring kits. However, a wireless body area network (WBAN) is a healthcare system that consists of nano sensors used to detect the real-time… More >

  • Open Access

    ARTICLE

    Handling Class Imbalance in Online Transaction Fraud Detection

    Kanika1, Jimmy Singla1, Ali Kashif Bashir2, Yunyoung Nam3,*, Najam UI Hasan4, Usman Tariq5

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2861-2877, 2022, DOI:10.32604/cmc.2022.019990

    Abstract With the rise of internet facilities, a greater number of people have started doing online transactions at an exponential rate in recent years as the online transaction system has eliminated the need of going to the bank physically for every transaction. However, the fraud cases have also increased causing the loss of money to the consumers. Hence, an effective fraud detection system is the need of the hour which can detect fraudulent transactions automatically in real-time. Generally, the genuine transactions are large in number than the fraudulent transactions which leads to the class imbalance problem. In this research work, an… More >

  • Open Access

    ARTICLE

    Enhancing Cloud Performance Using File Format Classifications

    Muhammad Junaid1,*, Adnan Sohail1, Monagi H. Alkinani2, Adeel Ahmed3, Mehmood Ahmed3, Faisal Rehman4

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3985-4007, 2022, DOI:10.32604/cmc.2022.019962

    Abstract Metaheuristic approaches in cloud computing have shown significant results due to their multi-objective advantages. These approaches are now considering hybrid metaheuristics combining the relative optimized benefits of two or more algorithms resulting in the least tradeoffs among several factors. The critical factors such as execution time, throughput time, response time, energy consumption, SLA violations, communication overhead, makespan, and migration time need careful attention while designing such dynamic algorithms. To improve such factors, an optimized multi-objective hybrid algorithm is being proposed that combines the relative advantages of Cat Swarm Optimization (CSO) with machine learning classifiers such as Support Vector Machine (SVM).… More >

  • Open Access

    ARTICLE

    Multi-Level Knowledge Engineering Approach for Mapping Implicit Aspects to Explicit Aspects

    Jibran Mir1, Azhar Mahmood2,*, Shaheen Khatoon3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3491-3509, 2022, DOI:10.32604/cmc.2022.019952

    Abstract Aspect's extraction is a critical task in aspect-based sentiment analysis, including explicit and implicit aspects identification. While extensive research has identified explicit aspects, little effort has been put forward on implicit aspects extraction due to the complexity of the problem. Moreover, existing research on implicit aspect identification is widely carried out on product reviews targeting specific aspects while neglecting sentences’ dependency problems. Therefore, in this paper, a multi-level knowledge engineering approach for identifying implicit movie aspects is proposed. The proposed method first identifies explicit aspects using a variant of BiLSTM and CRF (Bidirectional Long Short Memory-Conditional Random Field), which serve… More >

  • Open Access

    ARTICLE

    Modified Differential Box Counting in Breast Masses for Bioinformatics Applications

    S. Sathiya Devi1, S. Vidivelli2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3049-3066, 2022, DOI:10.32604/cmc.2022.019917

    Abstract Breast cancer is one of the common invasive cancers and stands at second position for death after lung cancer. The present research work is useful in image processing for characterizing shape and gray-scale complexity. The proposed Modified Differential Box Counting (MDBC) extract Fractal features such as Fractal Dimension (FD), Lacunarity, and Succolarity for shape characterization. In traditional DBC method, the unreasonable results obtained when FD is computed for tumour regions with the same roughness of intensity surface but different gray-levels. The problem is overcome by the proposed MDBC method that uses box over counting and under counting that covers the… More >

  • Open Access

    ARTICLE

    DLBT: Deep Learning-Based Transformer to Generate Pseudo-Code from Source Code

    Walaa Gad1,*, Anas Alokla1, Waleed Nazih2, Mustafa Aref1, Abdel-badeeh Salem1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3117-3132, 2022, DOI:10.32604/cmc.2022.019884

    Abstract Understanding the content of the source code and its regular expression is very difficult when they are written in an unfamiliar language. Pseudo-code explains and describes the content of the code without using syntax or programming language technologies. However, writing Pseudo-code to each code instruction is laborious. Recently, neural machine translation is used to generate textual descriptions for the source code. In this paper, a novel deep learning-based transformer (DLBT) model is proposed for automatic Pseudo-code generation from the source code. The proposed model uses deep learning which is based on Neural Machine Translation (NMT) to work as a language… More >

  • Open Access

    ARTICLE

    An Ensemble Methods for Medical Insurance Costs Prediction Task

    Nataliya Shakhovska1, Nataliia Melnykova1,*, Valentyna Chopiyak2, Michal Gregus ml3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3969-3984, 2022, DOI:10.32604/cmc.2022.019882

    Abstract The paper reports three new ensembles of supervised learning predictors for managing medical insurance costs. The open dataset is used for data analysis methods development. The usage of artificial intelligence in the management of financial risks will facilitate economic wear time and money and protect patients’ health. Machine learning is associated with many expectations, but its quality is determined by choosing a good algorithm and the proper steps to plan, develop, and implement the model. The paper aims to develop three new ensembles for individual insurance costs prediction to provide high prediction accuracy. Pierson coefficient and Boruta algorithm are used… More >

  • Open Access

    ARTICLE

    Methods for the Efficient Energy Management in a Smart Mini Greenhouse

    Vasyl Teslyuk1,*, Ivan Tsmots1, Michal Gregus ml.2, Taras Teslyuk3, Iryna Kazymyra1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3169-3187, 2022, DOI:10.32604/cmc.2022.019869

    Abstract To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption. One of the possible ways is proposed in this research. A multi-level hierarchical system for energy efficiency management of the enterprise is designed, it is based on the modular principle providing rapid modernization. The novelty of the work is the development of new and improvement of the existing methods and models, in particular: 1) models for dynamic analysis of IT tools for data acquisition and processing (DAAP) in multilevel energy management systems, which are based on Petri nets; 2) method of synthesis of… More >

Displaying 10551-10560 on page 1056 of 22098. Per Page