Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10,348)
  • Open Access

    ARTICLE

    Layered Feature Engineering for E-Commerce Purchase Prediction: A Hierarchical Evaluation on Taobao User Behavior Datasets

    Liqiu Suo1, Lin Xia1, Yoona Chung1, Eunchan Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.076329 - 10 February 2026

    Abstract Accurate purchase prediction in e-commerce critically depends on the quality of behavioral features. This paper proposes a layered and interpretable feature engineering framework that organizes user signals into three layers: Basic, Conversion & Stability (efficiency and volatility across actions), and Advanced Interactions & Activity (cross-behavior synergies and intensity). Using real Taobao (Alibaba’s primary e-commerce platform) logs (57,976 records for 10,203 users; 25 November–03 December 2017), we conducted a hierarchical, layer-wise evaluation that holds data splits and hyperparameters fixed while varying only the feature set to quantify each layer’s marginal contribution. Across logistic regression (LR), decision… More >

  • Open Access

    ARTICLE

    Multi-Algorithm Machine Learning Framework for Predicting Crystal Structures of Lithium Manganese Silicate Cathodes Using DFT Data

    Muhammad Ishtiaq1, Yeon-Ju Lee2, Annabathini Geetha Bhavani3, Sung-Gyu Kang1,*, Nagireddy Gari Subba Reddy2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.075957 - 10 February 2026

    Abstract Lithium manganese silicate (Li-Mn-Si-O) cathodes are key components of lithium-ion batteries, and their physical and mechanical properties are strongly influenced by their underlying crystal structures. In this study, a range of machine learning (ML) algorithms were developed and compared to predict the crystal systems of Li-Mn-Si-O cathode materials using density functional theory (DFT) data obtained from the Materials Project database. The dataset comprised 211 compositions characterized by key descriptors, including formation energy, energy above the hull, bandgap, atomic site number, density, and unit cell volume. These features were utilized to classify the materials into monoclinic… More >

  • Open Access

    REVIEW

    Pigeon-Inspired Optimization Algorithm: Definition, Variants, and Its Applications in Unmanned Aerial Vehicles

    Yu-Xuan Zhou1, Kai-Qing Zhou1,*, Wei-Lin Chen1, Zhou-Hua Liao1, Di-Wen Kang1,2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075099 - 10 February 2026

    Abstract The Pigeon-Inspired Optimization (PIO) algorithm constitutes a metaheuristic method derived from the homing behaviour of pigeons. Initially formulated for three-dimensional path planning in unmanned aerial vehicles (UAVs), the algorithm has attracted considerable academic and industrial interest owing to its effective balance between exploration and exploitation, coupled with advantages in real-time performance and robustness. Nevertheless, as applications have diversified, limitations in convergence precision and a tendency toward premature convergence have become increasingly evident, highlighting a need for improvement. This review systematically outlines the developmental trajectory of the PIO algorithm, with a particular focus on its core… More >

  • Open Access

    ARTICLE

    SSA*-PDWA: A Hierarchical Path Planning Framework with Enhanced A* Algorithm and Dynamic Window Approach for Mobile Robots

    Lishu Qin*, Yu Gao, Xinyuan Lu

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074739 - 10 February 2026

    Abstract With the rapid development of intelligent navigation technology, efficient and safe path planning for mobile robots has become a core requirement. To address the challenges of complex dynamic environments, this paper proposes an intelligent path planning framework based on grid map modeling. First, an improved Safe and Smooth A* (SSA*) algorithm is employed for global path planning. By incorporating obstacle expansion and corner-point optimization, the proposed SSA* enhances the safety and smoothness of the planned path. Then, a Partitioned Dynamic Window Approach (PDWA) is integrated for local planning, which is triggered when dynamic or sudden… More >

  • Open Access

    ARTICLE

    Lexical-Prior-Free Planning: A Symbol-Agnostic Pipeline that Enables LLMs and LRMs to Plan under Obfuscated Interfaces

    Zhendong Du*, Hanliu Wang, Kenji Hashimoto

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074520 - 10 February 2026

    Abstract Planning in lexical-prior-free environments presents a fundamental challenge for evaluating whether large language models (LLMs) possess genuine structural reasoning capabilities beyond lexical memorization. When predicates and action names are replaced with semantically irrelevant random symbols while preserving logical structures, existing direct generation approaches exhibit severe performance degradation. This paper proposes a symbol-agnostic closed-loop planning pipeline that enables models to construct executable plans through systematic validation and iterative refinement. The system implements a complete generate-verify-repair cycle through six core processing components: semantic comprehension extracts structural constraints, language planner generates text plans, symbol translator performs structure-preserving mapping,… More >

  • Open Access

    ARTICLE

    HMA-DER: A Hierarchical Attention and Expert Routing Framework for Accurate Gastrointestinal Disease Diagnosis

    Sara Tehsin1, Inzamam Mashood Nasir1,*, Wiem Abdelbaki2, Fadwa Alrowais3, Khalid A. Alattas4, Sultan Almutairi5, Radwa Marzouk6

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074416 - 10 February 2026

    Abstract Objective: Deep learning is employed increasingly in Gastroenterology (GI) endoscopy computer-aided diagnostics for polyp segmentation and multi-class disease detection. In the real world, implementation requires high accuracy, therapeutically relevant explanations, strong calibration, domain generalization, and efficiency. Current Convolutional Neural Network (CNN) and transformer models compromise border precision and global context, generate attention maps that fail to align with expert reasoning, deteriorate during cross-center changes, and exhibit inadequate calibration, hence diminishing clinical trust. Methods: HMA-DER is a hierarchical multi-attention architecture that uses dilation-enhanced residual blocks and an explainability-aware Cognitive Alignment Score (CAS) regularizer to directly align… More >

  • Open Access

    ARTICLE

    Effective Token Masking Augmentation Using Term-Document Frequency for Language Model-Based Legal Case Classification

    Ye-Chan Park1, Mohd Asyraf Zulkifley2, Bong-Soo Sohn3, Jaesung Lee4,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074141 - 10 February 2026

    Abstract Legal case classification involves the categorization of legal documents into predefined categories, which facilitates legal information retrieval and case management. However, real-world legal datasets often suffer from class imbalances due to the uneven distribution of case types across legal domains. This leads to biased model performance, in the form of high accuracy for overrepresented categories and underperformance for minority classes. To address this issue, in this study, we propose a data augmentation method that masks unimportant terms within a document selectively while preserving key terms from the perspective of the legal domain. This approach enhances More >

  • Open Access

    ARTICLE

    A Distributed Anonymous Reputation System for V2X Communication

    Shahidatul Sadiah1,#, Toru Nakanishi2,#,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073774 - 10 February 2026

    Abstract V2X communication enables vehicles to share real-time traffic and road-condition data, but binding messages to persistent identifiers enables location tracking. Furthermore, since forged reports from malicious vehicles can distort trust decisions and threaten road safety, privacy-preserving trust management is essential. Lu et al. previously presented BARS, an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication. In this system, reputation certificates without a vehicle identifier ensure anonymity, while two authorities jointly manage certificate issuance and reputation updates. However, the centralized certificate updates introduce scalability limitations, and the authorities… More >

  • Open Access

    ARTICLE

    Detection of Maliciously Disseminated Hate Speech in Spanish Using Fine-Tuning and In-Context Learning Techniques with Large Language Models

    Tomás Bernal-Beltrán1, Ronghao Pan1, José Antonio García-Díaz1, María del Pilar Salas-Zárate2, Mario Andrés Paredes-Valverde2, Rafael Valencia-García1,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073629 - 10 February 2026

    Abstract The malicious dissemination of hate speech via compromised accounts, automated bot networks and malware-driven social media campaigns has become a growing cybersecurity concern. Automatically detecting such content in Spanish is challenging due to linguistic complexity and the scarcity of annotated resources. In this paper, we compare two predominant AI-based approaches for the forensic detection of malicious hate speech: (1) fine-tuning encoder-only models that have been trained in Spanish and (2) In-Context Learning techniques (Zero- and Few-Shot Learning) with large-scale language models. Our approach goes beyond binary classification, proposing a comprehensive, multidimensional evaluation that labels each… More >

  • Open Access

    ARTICLE

    Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment

    Huihui Zhu1, Fei Tang2,*, Chunhua Jin3, Ping Wang1

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.073550 - 10 February 2026

    Abstract The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication. Although various authentication and key agreement protocols have been developed, current approaches are constrained by homogeneous cryptosystem frameworks, namely public key infrastructure (PKI), identity-based cryptography (IBC), or certificateless cryptography (CLC), each presenting limitations in client-server architectures. Specifically, PKI incurs certificate management overhead, IBC introduces key escrow risks, and CLC encounters cross-system interoperability challenges. To overcome these shortcomings, this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client More >

Displaying 1-10 on page 1 of 10348. Per Page