Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (679)
  • Open Access

    ARTICLE

    Cross-Project Software Defect Prediction Based on SMOTE and Deep Canonical Correlation Analysis

    Xin Fan1,2, Shuqing Zhang1,2,*, Kaisheng Wu1,2, Wei Zheng1,2, Yu Ge1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1687-1711, 2024, DOI:10.32604/cmc.2023.046187

    Abstract Cross-Project Defect Prediction (CPDP) is a method that utilizes historical data from other source projects to train predictive models for defect prediction in the target project. However, existing CPDP methods only consider linear correlations between features (indicators) of the source and target projects. These models are not capable of evaluating non-linear correlations between features when they exist, for example, when there are differences in data distributions between the source and target projects. As a result, the performance of such CPDP models is compromised. In this paper, this paper proposes a novel CPDP method based on Synthetic Minority Oversampling Technique (SMOTE)… More >

  • Open Access

    ARTICLE

    Machine Learning Security Defense Algorithms Based on Metadata Correlation Features

    Ruchun Jia, Jianwei Zhang*, Yi Lin

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2391-2418, 2024, DOI:10.32604/cmc.2024.044149

    Abstract With the popularization of the Internet and the development of technology, cyber threats are increasing day by day. Threats such as malware, hacking, and data breaches have had a serious impact on cybersecurity. The network security environment in the era of big data presents the characteristics of large amounts of data, high diversity, and high real-time requirements. Traditional security defense methods and tools have been unable to cope with the complex and changing network security threats. This paper proposes a machine-learning security defense algorithm based on metadata association features. Emphasize control over unauthorized users through privacy, integrity, and availability. The… More >

  • Open Access

    ARTICLE

    Improving Video Watermarking through Galois Field GF(24) Multiplication Tables with Diverse Irreducible Polynomials and Adaptive Techniques

    Yasmin Alaa Hassan1,*, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1423-1442, 2024, DOI:10.32604/cmc.2023.046149

    Abstract Video watermarking plays a crucial role in protecting intellectual property rights and ensuring content authenticity. This study delves into the integration of Galois Field (GF) multiplication tables, especially GF(24), and their interaction with distinct irreducible polynomials. The primary aim is to enhance watermarking techniques for achieving imperceptibility, robustness, and efficient execution time. The research employs scene selection and adaptive thresholding techniques to streamline the watermarking process. Scene selection is used strategically to embed watermarks in the most vital frames of the video, while adaptive thresholding methods ensure that the watermarking process adheres to imperceptibility criteria, maintaining the video’s visual quality.… More >

  • Open Access

    ARTICLE

    IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations

    Yajing Ma1,2,3, Gulila Altenbek1,2,3,*, Yingxia Yu1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2023.045486

    Abstract Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events, we propose an Independent Recurrent Temporal Graph Convolution Networks (IndRT-GCNets) framework to efficiently and accurately capture event attribute information. The framework models the knowledge graph sequences to learn the evolutionary representations of entities and relations within each period. Firstly, by utilizing the temporal graph convolution module in the evolutionary representation unit, the framework captures the structural dependency relationships within the knowledge graph in each period. Meanwhile, to achieve better event representation and establish effective correlations,… More >

  • Open Access

    ARTICLE

    Spatiotemporal Prediction of Urban Traffics Based on Deep GNN

    Ming Luo1, Huili Dou2, Ning Zheng3,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 265-282, 2024, DOI:10.32604/cmc.2023.040067

    Abstract Traffic prediction already plays a significant role in applications like traffic planning and urban management, but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of traffic data. As well as to fulfil both long-term and short-term prediction objectives, a better representation of the temporal dependency and global spatial correlation of traffic data is needed. In order to do this, the Spatiotemporal Graph Neural Network (S-GNN) is proposed in this research as a method for traffic prediction. The S-GNN simultaneously accepts various traffic data as inputs and investigates the non-linear correlations between the variables. In terms… More >

  • Open Access

    ARTICLE

    Fast and Accurate Predictor-Corrector Methods Using Feedback-Accelerated Picard Iteration for Strongly Nonlinear Problems

    Xuechuan Wang1, Wei He1,*, Haoyang Feng1, Satya N. Atluri2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1263-1294, 2024, DOI:10.32604/cmes.2023.043068

    Abstract Although predictor-corrector methods have been extensively applied, they might not meet the requirements of practical applications and engineering tasks, particularly when high accuracy and efficiency are necessary. A novel class of correctors based on feedback-accelerated Picard iteration (FAPI) is proposed to further enhance computational performance. With optimal feedback terms that do not require inversion of matrices, significantly faster convergence speed and higher numerical accuracy are achieved by these correctors compared with their counterparts; however, the computational complexities are comparably low. These advantages enable nonlinear engineering problems to be solved quickly and accurately, even with rough initial guesses from elementary predictors.… More > Graphic Abstract

    Fast and Accurate Predictor-Corrector Methods Using Feedback-Accelerated Picard Iteration for Strongly Nonlinear Problems

  • Open Access

    ARTICLE

    Natural Convection and Irreversibility of Nanofluid Due to Inclined Magnetohydrodynamics (MHD) Filled in a Cavity with Y-Shape Heated Fin: FEM Computational Configuration

    Afraz Hussain Majeed1, Rashid Mahmood2, Sayed M. Eldin3, Imran Saddique4,5,*, S. Saleem6, Muhammad Jawad7

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1505-1519, 2024, DOI:10.32604/cmes.2023.030255

    Abstract This study explains the entropy process of natural convective heating in the nanofluid-saturated cavity in a heated fin and magnetic field. The temperature is constant on the Y-shaped fin, insulating the top wall while the remaining walls remain cold. All walls are subject to impermeability and non-slip conditions. The mathematical modeling of the problem is demonstrated by the continuity, momentum, and energy equations incorporating the inclined magnetic field. For elucidating the flow characteristics Finite Element Method (FEM) is implemented using stable FE pair. A hybrid fine mesh is used for discretizing the domain. Velocity and thermal plots concerning parameters are… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper. The positive… More >

  • Open Access

    CORRECTION

    Correction: Stock Market Index Prediction Using Machine Learning and Deep Learning Techniques

    Abdus Saboor1,4, Arif Hussain2, Bless Lord Y. Agbley3, Amin ul Haq3,*, Jian Ping Li3, Rajesh Kumar1,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 107-107, 2023, DOI:10.32604/iasc.2023.047463

    Abstract This article has no abstract. More >

  • Open Access

    CORRECTION

    Correction: Spatio Temporal Tourism Tracking System Based on Adaptive Convolutional Neural Network

    L. Maria Michael Visuwasam1,*, D. Paul Raj2

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 267-267, 2024, DOI:10.32604/csse.2023.047461

    Abstract This article has no abstract. More >

Displaying 21-30 on page 3 of 679. Per Page