Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7,234)
  • Open Access

    ARTICLE

    Multi-UAV Collaborative Mission Planning Method for Self-Organized Sensor Data Acquisition

    Shijie Yang1, Jiateng Yuan1, Zhipeng Zhang1, Zhibo Chen1,2, Hanchao Zhang4, Xiaohui Cui1,2,3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1529-1563, 2024, DOI:10.32604/cmc.2024.055402 - 15 October 2024

    Abstract In recent years, sensor technology has been widely used in the defense and control of sensitive areas in cities, or in various scenarios such as early warning of forest fires, monitoring of forest pests and diseases, and protection of endangered animals. Deploying sensors to collect data and then utilizing unmanned aerial vehicle (UAV) to collect the data stored in the sensors has replaced traditional manual data collection as the dominant method. The current strategies for efficient data collection in above scenarios are still imperfect, and the low quality of the collected data and the excessive… More >

  • Open Access

    ARTICLE

    Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks

    Adisa Hasković Džubur*, Samir Čaušević, Belma Memić, Muhamed Begović, Elma Avdagić-Golub, Alem Čolaković

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1059-1084, 2024, DOI:10.32604/cmc.2024.055386 - 15 October 2024

    Abstract Wireless sensor networks (WSNs) are characterized by heterogeneous traffic types (audio, video, data) and diverse application traffic requirements. This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs. The requirements for each class regarding sensitivity to QoS (Quality of Service) parameters, such as loss, delay, and jitter, are described. These classes encompass real-time and delay-tolerant traffic. Given that QoS evaluation is a multi-criteria decision-making problem, we employed the AHP (Analytical Hierarchy Process) method for multi-criteria optimization. As a result of this approach, we derived weight values for different traffic… More >

  • Open Access

    ARTICLE

    An Aerial Target Recognition Algorithm Based on Self-Attention and LSTM

    Futai Liang1,2, Xin Chen1,*, Song He1, Zihao Song1, Hao Lu3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1101-1121, 2024, DOI:10.32604/cmc.2024.055326 - 15 October 2024

    Abstract In the application of aerial target recognition, on the one hand, the recognition error produced by the single measurement of the sensor is relatively large due to the impact of noise. On the other hand, it is difficult to apply machine learning methods to improve the intelligence and recognition effect due to few or no actual measurement samples. Aiming at these problems, an aerial target recognition algorithm based on self-attention and Long Short-Term Memory Network (LSTM) is proposed. LSTM can effectively extract temporal dependencies. The attention mechanism calculates the weight of each input element and… More >

  • Open Access

    ARTICLE

    Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data

    Fahim Nasir1, Abdulghani Ali Ahmed1,*, Mehmet Sabir Kiraz1, Iryna Yevseyeva1, Mubarak Saif2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1703-1728, 2024, DOI:10.32604/cmc.2024.055192 - 15 October 2024

    Abstract Integrating machine learning and data mining is crucial for processing big data and extracting valuable insights to enhance decision-making. However, imbalanced target variables within big data present technical challenges that hinder the performance of supervised learning classifiers on key evaluation metrics, limiting their overall effectiveness. This study presents a comprehensive review of both common and recently developed Supervised Learning Classifiers (SLCs) and evaluates their performance in data-driven decision-making. The evaluation uses various metrics, with a particular focus on the Harmonic Mean Score (F-1 score) on an imbalanced real-world bank target marketing dataset. The findings indicate… More >

  • Open Access

    REVIEW

    Internet Inter-Domain Path Inferring: Methods, Applications, and Future Directions

    Xionglve Li, Chengyu Wang, Yifan Yang, Changsheng Hou, Bingnan Hou, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 53-78, 2024, DOI:10.32604/cmc.2024.055186 - 15 October 2024

    Abstract The global Internet is a complex network of interconnected autonomous systems (ASes). Understanding Internet inter-domain path information is crucial for understanding, managing, and improving the Internet. The path information can also help protect user privacy and security. However, due to the complicated and heterogeneous structure of the Internet, path information is not publicly available. Obtaining path information is challenging due to the limited measurement probes and collectors. Therefore, inferring Internet inter-domain paths from the limited data is a supplementary approach to measure Internet inter-domain paths. The purpose of this survey is to provide an overview… More >

  • Open Access

    ARTICLE

    KubeFuzzer: Automating RESTful API Vulnerability Detection in Kubernetes

    Tao Zheng1, Rui Tang1,2,3, Xingshu Chen1,2,3,*, Changxiang Shen1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1595-1612, 2024, DOI:10.32604/cmc.2024.055180 - 15 October 2024

    Abstract RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes platforms. Existing tools struggle with generating lengthy, high-semantic request sequences that can pass Kubernetes API gateway checks. To address this, we propose KubeFuzzer, a black-box fuzzing tool designed for Kubernetes RESTful APIs. KubeFuzzer utilizes Natural Language Processing (NLP) to extract and integrate semantic information from API specifications and response messages, guiding the generation of more effective request sequences. Our evaluation of KubeFuzzer on various Kubernetes clusters shows that it improves code coverage by 7.86% to 36.34%, increases the successful response rate by More >

  • Open Access

    ARTICLE

    Paraelectric Doping Simultaneously Improves the Field Frequency Adaptability and Dielectric Properties of Ferroelectric Materials: A Phase-Field Study

    Zhi Wang1, Jinming Cao1, Zhonglei Liu1, Yuhong Zhao1,2,3,*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 213-228, 2024, DOI:10.32604/cmc.2024.055169 - 15 October 2024

    Abstract Recent years, the polarization response of ferroelectrics has been entirely studied. However, it is found that the polarization may disappear gradually with the continually applied of electric field. In this paper, taking K0.48Na0.52NbO3(KNN) as an example, it was demonstrated that the residual polarization began to decrease when the electric field frequency increased to a certain extent using a phase-field methods. The results showed that the content of out-of-plane domains increased first and then decreased with the increase of applied electric field frequency, the maximum polarization disappeared at high frequencies, and the hysteresis loop became elliptical. In More >

  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    ARTICLE

    Adaptive Successive POI Recommendation via Trajectory Sequences Processing and Long Short-Term Preference Learning

    Yali Si1,2, Feng Li1,*, Shan Zhong1,2, Chenghang Huo3, Jing Chen4, Jinglian Liu1,2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 685-706, 2024, DOI:10.32604/cmc.2024.055141 - 15 October 2024

    Abstract Point-of-interest (POI) recommendations in location-based social networks (LBSNs) have developed rapidly by incorporating feature information and deep learning methods. However, most studies have failed to accurately reflect different users’ preferences, in particular, the short-term preferences of inactive users. To better learn user preferences, in this study, we propose a long-short-term-preference-based adaptive successive POI recommendation (LSTP-ASR) method by combining trajectory sequence processing, long short-term preference learning, and spatiotemporal context. First, the check-in trajectory sequences are adaptively divided into recent and historical sequences according to a dynamic time window. Subsequently, an adaptive filling strategy is used to… More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption

    Zongbao Jiang, Minqing Zhang*, Weina Dong, Chao Jiang, Fuqiang Di

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1123-1155, 2024, DOI:10.32604/cmc.2024.055120 - 15 October 2024

    Abstract With the rapid advancement of cloud computing technology, reversible data hiding algorithms in encrypted images (RDH-EI) have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments. However, existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios. To address these challenges, this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection (AMED) and ciphertext-policy attribute-based encryption (CP-ABE). This proposed algorithm enhances the conventional median edge detection (MED) by incorporating dynamic variables to improve pixel prediction… More >

Displaying 1451-1460 on page 146 of 7234. Per Page