Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,438)
  • Open Access

    ARTICLE

    An Uncertainty Quantization-Based Method for Anti-UAV Detection in Infrared Images

    Can Wu1,2, Wenyi Tang2, Yunbo Rao1,2,*, Yinjie Chen1, Hui Ding2, Shuzhen Zhu3, Yuanyuan Wang3

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1415-1434, 2025, DOI:10.32604/cmc.2025.059797 - 26 March 2025

    Abstract Infrared unmanned aerial vehicle (UAV) target detection presents significant challenges due to the interplay between small targets and complex backgrounds. Traditional methods, while effective in controlled environments, often fail in scenarios involving long-range targets, high noise levels, or intricate backgrounds, highlighting the need for more robust approaches. To address these challenges, we propose a novel three-stage UAV segmentation framework that leverages uncertainty quantification to enhance target saliency. This framework incorporates a Bayesian convolutional neural network capable of generating both segmentation maps and probabilistic uncertainty maps. By utilizing uncertainty predictions, our method refines segmentation outcomes, achieving… More >

  • Open Access

    ARTICLE

    An Enhanced Task Migration Technique Based on Convolutional Neural Network in Machine Learning Framework

    Hamayun Khan1,*, Muhammad Atif Imtiaz2, Hira Siddique3, Muhammad Tausif Afzal Rana4, Arshad Ali5, Muhammad Zeeshan Baig6, Saif ur Rehman7, Yazed Alsaawy5

    Computer Systems Science and Engineering, Vol.49, pp. 317-331, 2025, DOI:10.32604/csse.2025.061118 - 19 March 2025

    Abstract The migration of tasks aided by machine learning (ML) predictions IN (DPM) is a system-level design technique that is used to reduce energy by enhancing the overall performance of the processor. In this paper, we address the issue of system-level higher task dissipation during the execution of parallel workloads with common deadlines by introducing a machine learning-based framework that includes task migration using energy-efficient earliest deadline first scheduling (EA-EDF). ML-based EA-EDF enhances the overall throughput and optimizes the energy to avoid delay and performance degradation in a multiprocessor system. The proposed system model allocates processors… More >

  • Open Access

    ARTICLE

    FractalNet-LSTM Model for Time Series Forecasting

    Nataliya Shakhovska, Volodymyr Shymanskyi*, Maksym Prymachenko

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4469-4484, 2025, DOI:10.32604/cmc.2025.062675 - 06 March 2025

    Abstract Time series forecasting is important in the fields of finance, energy, and meteorology, but traditional methods often fail to cope with the complex nonlinear and nonstationary processes of real data. In this paper, we propose the FractalNet-LSTM model, which combines fractal convolutional units with recurrent long short-term memory (LSTM) layers to model time series efficiently. To test the effectiveness of the model, data with complex structures and patterns, in particular, with seasonal and cyclical effects, were used. To better demonstrate the obtained results and the formed conclusions, the model performance was shown on the datasets More >

  • Open Access

    ARTICLE

    Machine Learning Stroke Prediction in Smart Healthcare: Integrating Fuzzy K-Nearest Neighbor and Artificial Neural Networks with Feature Selection Techniques

    Abdul Ahad1,2, Ira Puspitasari1,3,*, Jiangbin Zheng2, Shamsher Ullah4, Farhan Ullah5, Sheikh Tahir Bakhsh6, Ivan Miguel Pires7,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5115-5134, 2025, DOI:10.32604/cmc.2025.062605 - 06 March 2025

    Abstract This research explores the use of Fuzzy K-Nearest Neighbor (F-KNN) and Artificial Neural Networks (ANN) for predicting heart stroke incidents, focusing on the impact of feature selection methods, specifically Chi-Square and Best First Search (BFS). The study demonstrates that BFS significantly enhances the performance of both classifiers. With BFS preprocessing, the ANN model achieved an impressive accuracy of 97.5%, precision and recall of 97.5%, and an Receiver Operating Characteristics (ROC) area of 97.9%, outperforming the Chi-Square-based ANN, which recorded an accuracy of 91.4%. Similarly, the F-KNN model with BFS achieved an accuracy of 96.3%, precision More >

  • Open Access

    ARTICLE

    Neural Network Algorithm Based on LVQ for Myocardial Infarction Detection and Localization Using Multi-Lead ECG Data

    Kassymbek Ozhikenov1, Zhadyra Alimbayeva1,*, Chingiz Alimbayev1,2,*, Aiman Ozhikenova1, Yeldos Altay1

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5257-5284, 2025, DOI:10.32604/cmc.2025.061508 - 06 March 2025

    Abstract Myocardial infarction (MI) is one of the leading causes of death globally among cardiovascular diseases, necessitating modern and accurate diagnostics for cardiac patient conditions. Among the available functional diagnostic methods, electrocardiography (ECG) is particularly well-known for its ability to detect MI. However, confirming its accuracy—particularly in identifying the localization of myocardial damage—often presents challenges in practice. This study, therefore, proposes a new approach based on machine learning models for the analysis of 12-lead ECG data to accurately identify the localization of MI. In particular, the learning vector quantization (LVQ) algorithm was applied, considering the contribution… More >

  • Open Access

    ARTICLE

    Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework

    Sachin Sharma1,2,*, Brajesh Kumar Singh3, Hitendra Garg2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4691-4708, 2025, DOI:10.32604/cmc.2025.061252 - 06 March 2025

    Abstract Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing tools. The manual forgery localization is often reliant on forensic expertise. In recent times, machine learning (ML) and deep learning (DL) have shown promising results in automating image forgery localization. However, the ML-based method relies on hand-crafted features. Conversely, the DL method automatically extracts shallow spatial features to enhance the accuracy. However, DL-based methods lack the global co-relation of the features due to this… More >

  • Open Access

    ARTICLE

    Heuristic Feature Engineering for Enhancing Neural Network Performance in Spatiotemporal Traffic Prediction

    Bin Sun1, Yinuo Wang1, Tao Shen1,*, Lu Zhang1, Renkang Geng2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4219-4236, 2025, DOI:10.32604/cmc.2025.060567 - 06 March 2025

    Abstract Traffic datasets exhibit complex spatiotemporal characteristics, including significant fluctuations in traffic volume and intricate periodical patterns, which pose substantial challenges for the accurate forecasting and effective management of traffic conditions. Traditional forecasting models often struggle to adequately capture these complexities, leading to suboptimal predictive performance. While neural networks excel at modeling intricate and nonlinear data structures, they are also highly susceptible to overfitting, resulting in inefficient use of computational resources and decreased model generalization. This paper introduces a novel heuristic feature extraction method that synergistically combines the strengths of non-neural network algorithms with neural networks… More >

  • Open Access

    ARTICLE

    A Latency-Efficient Integration of Channel Attention for ConvNets

    Woongkyu Park1, Yeongyu Choi2, Mahammad Shareef Mekala3, Gyu Sang Choi1, Kook-Yeol Yoo1, Ho-youl Jung1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 3965-3981, 2025, DOI:10.32604/cmc.2025.059966 - 06 March 2025

    Abstract Designing fast and accurate neural networks is becoming essential in various vision tasks. Recently, the use of attention mechanisms has increased, aimed at enhancing the vision task performance by selectively focusing on relevant parts of the input. In this paper, we concentrate on squeeze-and-excitation (SE)-based channel attention, considering the trade-off between latency and accuracy. We propose a variation of the SE module, called squeeze-and-excitation with layer normalization (SELN), in which layer normalization (LN) replaces the sigmoid activation function. This approach reduces the vanishing gradient problem while enhancing feature diversity and discriminability of channel attention. In… More >

  • Open Access

    ARTICLE

    SFPBL: Soft Filter Pruning Based on Logistic Growth Differential Equation for Neural Network

    Can Hu1, Shanqing Zhang2,*, Kewei Tao2, Gaoming Yang1, Li Li2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4913-4930, 2025, DOI:10.32604/cmc.2025.059770 - 06 March 2025

    Abstract The surge of large-scale models in recent years has led to breakthroughs in numerous fields, but it has also introduced higher computational costs and more complex network architectures. These increasingly large and intricate networks pose challenges for deployment and execution while also exacerbating the issue of network over-parameterization. To address this issue, various network compression techniques have been developed, such as network pruning. A typical pruning algorithm follows a three-step pipeline involving training, pruning, and retraining. Existing methods often directly set the pruned filters to zero during retraining, significantly reducing the parameter space. However, this… More >

  • Open Access

    ARTICLE

    MMH-FE: A Multi-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption

    Hao Li1,#, Kuan Shao1,#, Xin Wang2, Mufeng Wang3, Zhenyong Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5387-5405, 2025, DOI:10.32604/cmc.2025.059718 - 06 March 2025

    Abstract Due to the development of cloud computing and machine learning, users can upload their data to the cloud for machine learning model training. However, dishonest clouds may infer user data, resulting in user data leakage. Previous schemes have achieved secure outsourced computing, but they suffer from low computational accuracy, difficult-to-handle heterogeneous distribution of data from multiple sources, and high computational cost, which result in extremely poor user experience and expensive cloud computing costs. To address the above problems, we propose a multi-precision, multi-sourced, and multi-key outsourcing neural network training scheme. Firstly, we design a multi-precision More >

Displaying 21-30 on page 3 of 1438. Per Page