Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (313)
  • Open Access

    ARTICLE

    Integration of Federated Learning and Graph Convolutional Networks for Movie Recommendation Systems

    Sony Peng1, Sophort Siet1, Ilkhomjon Sadriddinov1, Dae-Young Kim2,*, Kyuwon Park3,*, Doo-Soon Park2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2041-2057, 2025, DOI:10.32604/cmc.2025.061166 - 16 April 2025

    Abstract Recommendation systems (RSs) are crucial in personalizing user experiences in digital environments by suggesting relevant content or items. Collaborative filtering (CF) is a widely used personalization technique that leverages user-item interactions to generate recommendations. However, it struggles with challenges like the cold-start problem, scalability issues, and data sparsity. To address these limitations, we develop a Graph Convolutional Networks (GCNs) model that captures the complex network of interactions between users and items, identifying subtle patterns that traditional methods may overlook. We integrate this GCNs model into a federated learning (FL) framework, enabling the model to learn… More >

  • Open Access

    ARTICLE

    Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce

    Yi Li1, Wenying Zheng2, Yu-Sheng Su3,4,5,*, Meiqin Tang6

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2719-2734, 2025, DOI:10.32604/cmc.2025.059949 - 16 April 2025

    Abstract AI applications have become ubiquitous, bringing significant convenience to various industries. In e-commerce, AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market strategy development. However, if the data used for AI applications is damaged or lost, it will inevitably affect the effectiveness of these AI applications. Therefore, it is essential to verify the integrity of e-commerce data. Although existing Provable Data Possession (PDP) protocols can verify the integrity of cloud data, they are not suitable for e-commerce scenarios due to the limited computational capabilities of edge servers, which More >

  • Open Access

    ARTICLE

    Dialogue Relation Extraction Enhanced with Trigger: A Multi-Feature Filtering and Fusion Model

    Haitao Wang1,2, Yuanzhao Guo1,2, Xiaotong Han1,2, Yuan Tian1,2,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 137-155, 2025, DOI:10.32604/cmc.2025.060534 - 26 March 2025

    Abstract Relation extraction plays a crucial role in numerous downstream tasks. Dialogue relation extraction focuses on identifying relations between two arguments within a given dialogue. To tackle the problem of low information density in dialogues, methods based on trigger enhancement have been proposed, yielding positive results. However, trigger enhancement faces challenges, which cause suboptimal model performance. First, the proportion of annotated triggers is low in DialogRE. Second, feature representations of triggers and arguments often contain conflicting information. In this paper, we propose a novel Multi-Feature Filtering and Fusion trigger enhancement approach to overcome these limitations. We first… More >

  • Open Access

    ARTICLE

    SFPBL: Soft Filter Pruning Based on Logistic Growth Differential Equation for Neural Network

    Can Hu1, Shanqing Zhang2,*, Kewei Tao2, Gaoming Yang1, Li Li2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4913-4930, 2025, DOI:10.32604/cmc.2025.059770 - 06 March 2025

    Abstract The surge of large-scale models in recent years has led to breakthroughs in numerous fields, but it has also introduced higher computational costs and more complex network architectures. These increasingly large and intricate networks pose challenges for deployment and execution while also exacerbating the issue of network over-parameterization. To address this issue, various network compression techniques have been developed, such as network pruning. A typical pruning algorithm follows a three-step pipeline involving training, pruning, and retraining. Existing methods often directly set the pruned filters to zero during retraining, significantly reducing the parameter space. However, this… More >

  • Open Access

    ARTICLE

    Local Content-Aware Enhancement for Low-Light Images with Non-Uniform Illumination

    Qi Mu*, Yuanjie Guo, Xiangfu Ge, Xinyue Wang, Zhanli Li

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4669-4690, 2025, DOI:10.32604/cmc.2025.058495 - 06 March 2025

    Abstract In low-light image enhancement, prevailing Retinex-based methods often struggle with precise illumination estimation and brightness modulation. This can result in issues such as halo artifacts, blurred edges, and diminished details in bright regions, particularly under non-uniform illumination conditions. We propose an innovative approach that refines low-light images by leveraging an in-depth awareness of local content within the image. By introducing multi-scale effective guided filtering, our method surpasses the limitations of traditional isotropic filters, such as Gaussian filters, in handling non-uniform illumination. It dynamically adjusts regularization parameters in response to local image characteristics and significantly integrates… More >

  • Open Access

    ARTICLE

    A Robust GNSS Navigation Filter Based on Maximum Correntropy Criterion with Variational Bayesian for Adaptivity

    Dah-Jing Jwo1,2,*, Yi Chang2, Ta-Shun Cho3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2771-2789, 2025, DOI:10.32604/cmes.2025.057825 - 03 March 2025

    Abstract In this paper, an advanced satellite navigation filter design, referred to as the Variational Bayesian Maximum Correntropy Extended Kalman Filter (VBMCEKF), is introduced to enhance robustness and adaptability in scenarios with non-Gaussian noise and heavy-tailed outliers. The proposed design modifies the extended Kalman filter (EKF) for the global navigation satellite system (GNSS), integrating the maximum correntropy criterion (MCC) and the variational Bayesian (VB) method. This adaptive algorithm effectively reduces non-line-of-sight (NLOS) reception contamination and improves estimation accuracy, particularly in time-varying GNSS measurements. Experimental results show that the proposed method significantly outperforms conventional approaches in estimation More >

  • Open Access

    ARTICLE

    Lip-Audio Modality Fusion for Deep Forgery Video Detection

    Yong Liu1,4, Zhiyu Wang2,*, Shouling Ji3, Daofu Gong1,5, Lanxin Cheng1, Ruosi Cheng1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3499-3515, 2025, DOI:10.32604/cmc.2024.057859 - 17 February 2025

    Abstract In response to the problem of traditional methods ignoring audio modality tampering, this study aims to explore an effective deep forgery video detection technique that improves detection precision and reliability by fusing lip images and audio signals. The main method used is lip-audio matching detection technology based on the Siamese neural network, combined with MFCC (Mel Frequency Cepstrum Coefficient) feature extraction of band-pass filters, an improved dual-branch Siamese network structure, and a two-stream network structure design. Firstly, the video stream is preprocessed to extract lip images, and the audio stream is preprocessed to extract MFCC… More >

  • Open Access

    ARTICLE

    Improving the Position Accuracy and Computational Efficiency of UAV Terrain Aided Navigation Using a Two-Stage Hybrid Fuzzy Particle Filtering Method

    Sofia Yousuf1, Muhammad Bilal Kadri2,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1193-1210, 2025, DOI:10.32604/cmc.2024.054587 - 03 January 2025

    Abstract Terrain Aided Navigation (TAN) technology has become increasingly important due to its effectiveness in environments where Global Positioning System (GPS) is unavailable. In recent years, TAN systems have been extensively researched for both aerial and underwater navigation applications. However, many TAN systems that rely on recursive Unmanned Aerial Vehicle (UAV) position estimation methods, such as Extended Kalman Filters (EKF), often face challenges with divergence and instability, particularly in highly non-linear systems. To address these issues, this paper proposes and investigates a hybrid two-stage TAN positioning system for UAVs that utilizes Particle Filter. To enhance the… More >

  • Open Access

    PROCEEDINGS

    An Investigation of Signal Filtering Methods in Trend Following Strategy Using LSTM

    Yi-Chun Cheng1, Mu-En Wu1, Ju-Fang Yen2, Sheng-Chi Luo1, Jimmy Ming-Tai Wu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.011239

    Abstract Quantitative trading is a strategy that relies on mathematical and statistical models to identify market trading opportunities. Trading strategies can be categorized into trend following and contrarian trading. Way of the Turtle is one of the famous trend following strategies. This study proposes a customized trend following trading mechanism based on Way of the Turtle. The focus of the strategy is to capture major trends over a few significant market moves, so it can be seen that the importance of the entry signals to the trend-following strategy. Therefore, this study applies Long Short-Term Memory (LSTM)… More >

  • Open Access

    ARTICLE

    AI-Driven Prioritization and Filtering of Windows Artifacts for Enhanced Digital Forensics

    Juhwan Kim, Baehoon Son, Jihyeon Yu, Joobeom Yun*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3371-3393, 2024, DOI:10.32604/cmc.2024.057234 - 18 November 2024

    Abstract Digital forensics aims to uncover evidence of cybercrimes within compromised systems. These cybercrimes are often perpetrated through the deployment of malware, which inevitably leaves discernible traces within the compromised systems. Forensic analysts are tasked with extracting and subsequently analyzing data, termed as artifacts, from these systems to gather evidence. Therefore, forensic analysts must sift through extensive datasets to isolate pertinent evidence. However, manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive. Previous studies addressed such inefficiencies by integrating artificial intelligence (AI) technologies into digital forensics. Despite the efforts in previous studies, artifacts were… More >

Displaying 1-10 on page 1 of 313. Per Page