Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,398)
  • Open Access

    ARTICLE

    A Graph Neural Network Recommendation Based on Long- and Short-Term Preference

    Bohuai Xiao1,2, Xiaolan Xie1,2,*, Chengyong Yang3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3067-3082, 2023, DOI:10.32604/csse.2023.034712

    Abstract The recommendation system (RS) on the strength of Graph Neural Networks (GNN) perceives a user-item interaction graph after collecting all items the user has interacted with. Afterward the RS performs neighborhood aggregation on the graph to generate long-term preference representations for the user in quick succession. However, user preferences are dynamic. With the passage of time and some trend guidance, users may generate some short-term preferences, which are more likely to lead to user-item interactions. A GNN recommendation based on long- and short-term preference (LSGNN) is proposed to address the above problems. LSGNN consists of four modules, using a GNN… More >

  • Open Access

    ARTICLE

    Medi-Block Record Secure Data Sharing in Healthcare System: Issues, Solutions and Challenges

    Zuriati Ahmad Zukarnain1,*, Amgad Muneer2,3, Nur Atirah Mohamad Nassir1, Akram A. Almohammedi4,5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2725-2740, 2023, DOI:10.32604/csse.2023.034448

    Abstract With the advancements in the era of artificial intelligence, blockchain, cloud computing, and big data, there is a need for secure, decentralized medical record storage and retrieval systems. While cloud storage solves storage issues, it is challenging to realize secure sharing of records over the network. Medi-block record in the healthcare system has brought a new digitalization method for patients’ medical records. This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital. It enables electronic medical records to be available with the correct authentication and restricts… More >

  • Open Access

    ARTICLE

    Pancreatic Cancer Data Classification with Quantum Machine Learning

    Amit Saxena1, Smita Saxena2,*

    Journal of Quantum Computing, Vol.5, pp. 1-13, 2023, DOI:10.32604/jqc.2023.044555

    Abstract Quantum computing is a promising new approach to tackle the complex real-world computational problems by harnessing the power of quantum mechanics principles. The inherent parallelism and exponential computational power of quantum systems hold the potential to outpace classical counterparts in solving complex optimization problems, which are pervasive in machine learning. Quantum Support Vector Machine (QSVM) is a quantum machine learning algorithm inspired by classical Support Vector Machine (SVM) that exploits quantum parallelism to efficiently classify data points in high-dimensional feature spaces. We provide a comprehensive overview of the underlying principles of QSVM, elucidating how different quantum feature maps and quantum… More >

  • Open Access

    ARTICLE

    Multi-Objective Prediction and Optimization of Vehicle Acoustic Package Based on ResNet Neural Network

    Yunru Wu1, Xiangbo Liu1, Haibo Huang1,2,*, Yudong Wu1, Weiping Ding1,2, Mingliang Yang1,2,*

    Sound & Vibration, Vol.57, pp. 73-95, 2023, DOI:10.32604/sv.2023.044601

    Abstract Vehicle interior noise has emerged as a crucial assessment criterion for automotive NVH (Noise, Vibration, and Harshness). When analyzing the NVH performance of the vehicle body, the traditional SEA (Statistical Energy Analysis) simulation technology is usually limited by the accuracy of the material parameters obtained during the acoustic package modeling and the limitations of the application conditions. In order to effectively solve these shortcomings, based on the analysis of the vehicle noise transmission path, a multi-level objective decomposition architecture of the interior noise at the driver’s right ear is established. Combined with the data-driven method, the ResNet neural network model… More >

  • Open Access

    ARTICLE

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    Yazeed Yasin Ghadi1, Mohammed S. Alshehri2, Sultan Almakdi2, Oumaima Saidani3,*, Nazik Alturki3, Fawad Masood4, Muhammad Shahbaz Khan5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 781-797, 2023, DOI:10.32604/cmc.2023.042777

    Abstract Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Substitution-box (S-box) often playing a pivotal role in many symmetric encryption systems. This study introduces an innovative approach to creating S-boxes for encryption algorithms. The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme. The nonlinearity measure of the proposed S-boxes is 112. These qualities significantly enhance its resistance to common cryptographic attacks, ensuring high image data security. Furthermore, to assess the robustness of the S-boxes, an encryption system… More >

  • Open Access

    REVIEW

    Action Recognition and Detection Based on Deep Learning: A Comprehensive Summary

    Yong Li1,4, Qiming Liang2,*, Bo Gan3, Xiaolong Cui4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1-23, 2023, DOI:10.32604/cmc.2023.042494

    Abstract Action recognition and detection is an important research topic in computer vision, which can be divided into action recognition and action detection. At present, the distinction between action recognition and action detection is not clear, and the relevant reviews are not comprehensive. Thus, this paper summarized the action recognition and detection methods and datasets based on deep learning to accurately present the research status in this field. Firstly, according to the way that temporal and spatial features are extracted from the model, the commonly used models of action recognition are divided into the two stream models, the temporal models, the… More >

  • Open Access

    ARTICLE

    Using Speaker-Specific Emotion Representations in Wav2vec 2.0-Based Modules for Speech Emotion Recognition

    Somin Park1, Mpabulungi Mark1, Bogyung Park2, Hyunki Hong1,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1009-1030, 2023, DOI:10.32604/cmc.2023.041332

    Abstract Speech emotion recognition is essential for frictionless human-machine interaction, where machines respond to human instructions with context-aware actions. The properties of individuals’ voices vary with culture, language, gender, and personality. These variations in speaker-specific properties may hamper the performance of standard representations in downstream tasks such as speech emotion recognition (SER). This study demonstrates the significance of speaker-specific speech characteristics and how considering them can be leveraged to improve the performance of SER models. In the proposed approach, two wav2vec-based modules (a speaker-identification network and an emotion classification network) are trained with the Arcface loss. The speaker-identification network has a… More >

  • Open Access

    ARTICLE

    Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge

    Shuqin Zhang, Xinyu Su*, Peiyu Shi, Tianhui Du, Yunfei Han

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 349-377, 2023, DOI:10.32604/cmc.2023.040964

    Abstract Cyber Threat Intelligence (CTI) is a valuable resource for cybersecurity defense, but it also poses challenges due to its multi-source and heterogeneous nature. Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly. To address these challenges, we propose a novel approach that consists of three steps. First, we construct the attack and defense analysis of the cybersecurity ontology (ADACO) model by integrating multiple cybersecurity databases. Second, we develop the threat evolution prediction algorithm (TEPA), which can automatically detect threats at device nodes, correlate and map multi-source threat information,… More >

  • Open Access

    ARTICLE

    Comparative Evaluation of Data Mining Algorithms in Breast Cancer

    Fuad A. M. Al-Yarimi*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 633-645, 2023, DOI:10.32604/cmc.2023.038858

    Abstract Unchecked breast cell growth is one of the leading causes of death in women globally and is the cause of breast cancer. The only method to avoid breast cancer-related deaths is through early detection and treatment. The proper classification of malignancies is one of the most significant challenges in the medical industry. Due to their high precision and accuracy, machine learning techniques are extensively employed for identifying and classifying various forms of cancer. Several data mining algorithms were studied and implemented by the author of this review and compared them to the present parameters and accuracy of various algorithms for… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Trees Disease Recognition and Classification Using Hyperspectral Data

    Uzair Aslam Bhatti1,*, Sibghat Ullah Bazai2, Shumaila Hussain1, Shariqa Fakhar3, Chin Soon Ku4,*, Shah Marjan5, Por Lip Yee6, Liu Jing1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 681-697, 2023, DOI:10.32604/cmc.2023.037958

    Abstract Crop diseases have a significant impact on plant growth and can lead to reduced yields. Traditional methods of disease detection rely on the expertise of plant protection experts, which can be subjective and dependent on individual experience and knowledge. To address this, the use of digital image recognition technology and deep learning algorithms has emerged as a promising approach for automating plant disease identification. In this paper, we propose a novel approach that utilizes a convolutional neural network (CNN) model in conjunction with Inception v3 to identify plant leaf diseases. The research focuses on developing a mobile application that leverages… More >

Displaying 21-30 on page 3 of 1398. Per Page