Surajit Das, Samaleswari P. Nayak, Biswajit Sahoo, Sarat Chandra Nayak
{"title":"Machine Learning in Healthcare Analytics: A State-of-the-Art Review","authors":"Surajit Das, Samaleswari P. Nayak, Biswajit Sahoo, Sarat Chandra Nayak","doi":"10.1007/s11831-024-10098-3","DOIUrl":"10.1007/s11831-024-10098-3","url":null,"abstract":"<div><p>The use of machine learning (ML) models have become a crucial factor in the growing field of healthcare, ushering in a new era of medical research and diagnosis. This study rigorously reviews research publications published in reputable journals during the last five years. The pace and dynamic nature of machine learning in the healthcare domains demonstrated by the arduous criteria, which are used to sort through these articles. Disease-centric analysis uncovered a wide range of deep learning and machine learning models which are designed to address particular medical problems. Convolutional neural networks (CNNs), one of the most complex deep learning architectures, coexist with more conventional statistical models like logistic regression and support vector machines. CNNs are particularly prominent when it comes to disorders that need picture processing, which highlights the significant influence of deep learning in deciphering complex medical patterns. The popularity of ensemble methods, such as Random Forest, Gradient Boosting, and AdaBoost, indicates that their ability to combine predictive capability and strengthen model resilience is well acknowledged. Hybrid techniques, which integrate the advantages of many models, provide novel approaches to tackle distinct healthcare problems. This research also sheds light on a nuanced approach for model selection, wherein deep learning models performs well with huge datasets and image analysis, while statistical and ensemble models provides better results with numerical and categorical data. The adaptability needed in healthcare analytics is shown by hybrid models, which frequently combine standard models for classification with deep learning for feature extraction. The present review can endow problems related to ML in healthcare domain, possible solutions, potential directions and some knowledge to the researchers working in this field.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3923 - 3962"},"PeriodicalIF":9.7,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing Nitsche’s Method for Variational Problems","authors":"Joseph Benzaken, John A. Evans, Rasmus Tamstorf","doi":"10.1007/s11831-023-09953-6","DOIUrl":"10.1007/s11831-023-09953-6","url":null,"abstract":"<div><p>Nitsche’s method is a well-established approach for weak enforcement of boundary conditions for partial differential equations (PDEs). It has many desirable properties, including the preservation of variational consistency and the fact that it yields symmetric, positive-definite discrete linear systems that are not overly ill-conditioned. In recent years, the method has gained in popularity in a number of areas, including isogeometric analysis, immersed methods, and contact mechanics. However, arriving at a formulation based on Nitsche’s method can be a mathematically arduous process, especially for high-order PDEs. Fortunately, the derivation is conceptually straightforward in the context of variational problems. The goal of this paper is to elucidate the process through a sequence of didactic examples. First, we show the derivation of Nitsche’s method for Poisson’s equation to gain an intuition for the various steps. Next, we present the abstract framework and then revisit the derivation for Poisson’s equation to use the framework and add mathematical rigor. In the process, we extend our derivation to cover the vector-valued setting. Armed with a basic recipe, we then show how to handle a higher-order problem by considering the vector-valued biharmonic equation and the linearized Kirchhoff–Love plate. In the end, the hope is that the reader will be able to apply Nitsche’s method to any problem that arises from variational principles.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 4","pages":"1867 - 1896"},"PeriodicalIF":9.7,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maryam Rehman, Muhammad Bilal Hafeez, Marek Krawczuk
{"title":"A Comprehensive Review: Applications of the Kozeny–Carman Model in Engineering with Permeability Dynamics","authors":"Maryam Rehman, Muhammad Bilal Hafeez, Marek Krawczuk","doi":"10.1007/s11831-024-10094-7","DOIUrl":"10.1007/s11831-024-10094-7","url":null,"abstract":"<div><p>In this review article, we investigate the dynamic nature of the Kozeny–Carman Model concerning permeability and its application in engineering contexts. Providing insights into the changing dynamics of permeability within mining, petroleum, and geotechnical engineering, among other engineering applications. While some are complex and require additional modifications to be applicable, others are simple and still function in specific situations. Therefore, having a thorough understanding of the most recent permeability evolution model would help engineers and researchers in finding the right solution for engineering issues for prospects. The permeability evolution model Kozeny–Carman (KC) put forth by previous and current researchers is compiled in this paper, with a focus on its features and drawbacks.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3843 - 3855"},"PeriodicalIF":9.7,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities","authors":"Komal Singh Gill, Anju Sharma, Sharad Saxena","doi":"10.1007/s11831-024-10095-6","DOIUrl":"10.1007/s11831-024-10095-6","url":null,"abstract":"<div><p>The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It highlights the significance of cloud computing as an integral part of modern technology due to its accessibility, scalability, and cost-effectiveness. However, the paper acknowledges that security issues pose a considerable concern in cloud computing, surpassing the effectiveness of traditional security measures. To overcome these challenges, the paper focuses on game theory as a valuable framework for modeling security scenarios by considering strategic interactions among multiple parties with conflicting interests. By analyzing existing research, the presented paper investigates the practical utilization of game theoretic models to enhance security in real-world cloud computing environments. The findings suggest that while game theory holds promise in offering effective security solutions, further research is imperative to address the practical limitations of these models in the context of cloud computing.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3857 - 3890"},"PeriodicalIF":9.7,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salma Yacoubi, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa
{"title":"A Metaheuristic Perspective on Extracting Numeric Association Rules: Current Works, Applications, and Recommendations","authors":"Salma Yacoubi, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa","doi":"10.1007/s11831-024-10109-3","DOIUrl":"10.1007/s11831-024-10109-3","url":null,"abstract":"<div><p>In the vast field of data mining, the increasing significance of Numerical Association Rule Mining (NARM) lies in its capacity to unearth recurrent patterns and correlations across diverse attribute types, resonating across multifarious sectors such as healthcare, commercial databases, and beyond. This article explores in depth the intricacies of optimization algorithms and metaheuristic approaches within the NARM framework, highlighting their essential role in amplifying the effectiveness and computational efficiency of the algorithms developed. In particular, the integration of metaheuristic optimization appears to be a significant advance, improving the accuracy and reliability of derived rules while avoiding the computational rigors of conventional processes. Exploration in this study, covers various areas of association rules, including numerical, fuzzy and high-utility sets, providing a solid synthesis of a meta-study and offering a holistic view that interweaves historical, methodological and future-oriented perspectives, thus seeking to immerse future research efforts in a comprehensive understanding of the incessant optimization approaches inherent in NARM’s vast scope in data mining. In particular, this survey considered the extensive metaheuristic-based NARM research works between 2015 and 2023. Initially commencing with a large corpus of 19,500 papers, a stringent filtration process was employed, resulting in the identification of 180 pertinent papers that contributed significantly to this survey.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"4087 - 4128"},"PeriodicalIF":9.7,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Optimization Techniques: A Survey, Classification, Challenges, and Future Research Issues","authors":"Kewei Bian, Rahul Priyadarshi","doi":"10.1007/s11831-024-10110-w","DOIUrl":"10.1007/s11831-024-10110-w","url":null,"abstract":"<div><p>Optimization approaches in machine learning (ML) are essential for training models to obtain high performance across numerous domains. The article provides a comprehensive overview of ML optimization strategies, emphasizing their classification, obstacles, and potential areas for further study. We proceed with studying the historical progression of optimization methods, emphasizing significant developments and their influence on contemporary algorithms. We analyse the present research to identify widespread optimization algorithms and their uses in supervised learning, unsupervised learning, and reinforcement learning. Various common optimization constraints, including non-convexity, scalability issues, convergence problems, and concerns about robustness and generalization, are also explored. We suggest future research should focus on scalability problems, innovative optimization techniques, domain knowledge integration, and improving interpretability. The present study aims to provide an in-depth review of ML optimization by combining insights from historical advancements, literature evaluations, and current issues to guide future research efforts.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"4209 - 4233"},"PeriodicalIF":9.7,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140366275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Gangwar, Vikash Kumar, Murat Yaylaci, Subrata Kumar Panda
{"title":"Computational Modelling and Mechanical Characteristics of Polymeric Hybrid Composite Materials: An Extensive Review","authors":"Ankit Gangwar, Vikash Kumar, Murat Yaylaci, Subrata Kumar Panda","doi":"10.1007/s11831-024-10097-4","DOIUrl":"10.1007/s11831-024-10097-4","url":null,"abstract":"<div><p>This study explores the reinforcement of foreign materials (fibers/particles) in polymeric composites, aiming to improve structural characteristics under variable loads. The article critically reviews experimental techniques for composite fabrication, computational modelling, and analysis. It also offers a detailed examination of mechanical properties, manufacturing defects, and applications associated with these composites. Hybrid composites (HC) are highlighted for their exceptional potential across various engineering applications, demonstrating enhanced structural attributes without imposing a weight penalty or surpassing the parent structure’s overall weight. The review explores into the influences of multiple defects, surface treatment, and other parameters affecting the structural integrity of HC during fabrication and application. Furthermore, the article provides a comprehensive understanding, including HC classifications, benefits, and limitations.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3901 - 3921"},"PeriodicalIF":9.7,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140369678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Machine Learning in Earthquake Seismology: A Review","authors":"Anup Chitkeshwar","doi":"10.1007/s11831-024-10099-2","DOIUrl":"10.1007/s11831-024-10099-2","url":null,"abstract":"<div><p>This comprehensive survey addresses the notable yet relatively uncharted territory of machine learning (ML) applications within the realm of earthquake engineering. While previous reviews have touched on ML’s involvement, this work strives to fill a gap by providing an extensive analysis of the extent to which ML has permeated earthquake engineering. It delves into how ML is facilitating and propelling research endeavors while aiding decision-makers in mitigating the repercussions of seismic hazards on civil structures. Earthquake engineering, an interdisciplinary field, encompasses the assessment of seismic hazards, characterization of site-specific effects, analysis of structural responses, evaluation of seismic risk and vulnerability, and examination of seismic protection measures. ML algorithms find application in a multitude of scenarios within each of these subfields, contributing to advancements in earthquake engineering research and practice.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3963 - 3975"},"PeriodicalIF":9.7,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140316026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Amiriebrahimabadi, Zhina Rouhi, Najme Mansouri
{"title":"A Comprehensive Survey of Multi-Level Thresholding Segmentation Methods for Image Processing","authors":"Mohammad Amiriebrahimabadi, Zhina Rouhi, Najme Mansouri","doi":"10.1007/s11831-024-10093-8","DOIUrl":"10.1007/s11831-024-10093-8","url":null,"abstract":"<div><p>In image processing, multi-level thresholding is a sophisticated technique used to delineate regions of interest in images by identifying intensity levels that differentiate different structures or objects. Multi-range intensity partitioning captures the complexity and variability of an image. The aim of metaheuristic algorithms is to find threshold values that maximize intra-class differences and minimize inter-class differences. Various approaches and algorithms are reviewed and their advantages, limitations, and challenges are discussed in this paper. In addition, the review identifies future research areas such as handling complex images and inhomogeneous data, determining thresholding levels automatically, and addressing algorithm interpretation. The comprehensive review provides insights for future advancements in multilevel thresholding techniques that can be used by researchers in the field of image processing.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 6","pages":"3647 - 3697"},"PeriodicalIF":9.7,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140315794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Vahid Sebt, Yaser Sadati-Keneti, Misagh Rahbari, Zohreh Gholipour, Hamid Mehri
{"title":"Regression Method in Data Mining: A Systematic Literature Review","authors":"Mohammad Vahid Sebt, Yaser Sadati-Keneti, Misagh Rahbari, Zohreh Gholipour, Hamid Mehri","doi":"10.1007/s11831-024-10088-5","DOIUrl":"10.1007/s11831-024-10088-5","url":null,"abstract":"<div><p>Regression is one of the most important supervised learning methods in data mining that is used to predict and discover knowledge in data mining science. After reviewing the studies conducted in the field of regression, it has been found that the tendency to use this method is increasing day by day among researchers. This study reviews 500 articles from about 230 reputable journals under one framework over the twenty-first century and also discusses the status and use of regression in data mining research. The systematic framework presented in this study includes the following steps: 1—Examining the position of regression in research conducted in data mining and determining the trend of different journals to conduct research in the field of regression in different years 2—Examining different study areas in the field of regression and determining the trend to conduct research in various areas of study in different years 3—Examining the algorithms used in the field of regression and determining the most widely used and trend to use algorithms by researchers in different years 4—Examining the keywords used in regression research in data mining and determining the strongest and most attractive rules obtained from the relationships of these keywords with each other using the Apriori algorithm.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 6","pages":"3515 - 3534"},"PeriodicalIF":9.7,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140316030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}