Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (333)
  • Open Access

    ARTICLE

    Side-Channel Leakage Analysis of Inner Product Masking

    Yuyuan Li1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049882

    Abstract The Inner Product Masking (IPM) scheme has been shown to provide higher theoretical security guarantees than the Boolean Masking (BM). This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security. Some previous work unfolds when certain (adversarial and implementation) conditions are met, and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour. In this paper, we investigate the security characteristics of IPM under different conditions. In adversarial condition, the security properties of first-order IPMs obtained through parametric characterization are preserved in the face… More >

  • Open Access

    ARTICLE

    E2E-MFERC: A Multi-Face Expression Recognition Model for Group Emotion Assessment

    Lin Wang1, Juan Zhao2, Hu Song3, Xiaolong Xu4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048688

    Abstract In smart classrooms, conducting multi-face expression recognition based on existing hardware devices to assess students’ group emotions can provide educators with more comprehensive and intuitive classroom effect analysis, thereby continuously promoting the improvement of teaching quality. However, most existing multi-face expression recognition methods adopt a multi-stage approach, with an overall complex process, poor real-time performance, and insufficient generalization ability. In addition, the existing facial expression datasets are mostly single face images, which are of low quality and lack specificity, also restricting the development of this research. This paper aims to propose an end-to-end high-performance multi-face expression recognition algorithm model suitable… More >

  • Open Access

    ARTICLE

    Multi-Objective Optimization Algorithm for Grouping Decision Variables Based on Extreme Point Pareto Frontier

    Jun Wang1,2, Linxi Zhang1,2, Hao Zhang1, Funan Peng1,*, Mohammed A. El-Meligy3, Mohamed Sharaf3, Qiang Fu1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048495

    Abstract The existing algorithms for solving multi-objective optimization problems fall into three main categories: Decomposition-based, dominance-based, and indicator-based. Traditional multi-objective optimization problems mainly focus on objectives, treating decision variables as a total variable to solve the problem without considering the critical role of decision variables in objective optimization. As seen, a variety of decision variable grouping algorithms have been proposed. However, these algorithms are relatively broad for the changes of most decision variables in the evolution process and are time-consuming in the process of finding the Pareto frontier. To solve these problems, a multi-objective optimization algorithm for grouping decision variables based… More >

  • Open Access

    ARTICLE

    A Dual Discriminator Method for Generalized Zero-Shot Learning

    Tianshu Wei1, Jinjie Huang1,2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048098

    Abstract Zero-shot learning enables the recognition of new class samples by migrating models learned from semantic features and existing sample features to things that have never been seen before. The problems of consistency of different types of features and domain shift problems are two of the critical issues in zero-shot learning. To address both of these issues, this paper proposes a new modeling structure. The traditional approach mapped semantic features and visual features into the same feature space; based on this, a dual discriminator approach is used in the proposed model. This dual discriminator approach can further enhance the consistency between… More >

  • Open Access

    ARTICLE

    Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment

    Sapiah Sakri1, Shakila Basheer1, Zuhaira Muhammad Zain1, Nurul Halimatul Asmak Ismail2,*, Dua’ Abdellatef Nassar1, Manal Abdullah Alohali1, Mais Ayman Alharaki1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048051

    Abstract Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide. Timely detection is crucial as sepsis can rapidly escalate if left undetected. Recent advancements in deep learning (DL) offer powerful tools to address this challenge. Aim: Thus, this study proposed a hybrid CNNBDLSTM, a combination of a convolutional neural network (CNN) with a bi-directional long short-term memory (BDLSTM) model to predict sepsis onset. Implementing the proposed model provides a robust framework that capitalizes on the complementary strengths of both architectures, resulting in more accurate and timelier predictions. Method: The sepsis prediction method proposed here utilizes… More >

  • Open Access

    ARTICLE

    A Novel Insertion Solution for the Travelling Salesman Problem

    Emmanuel Oluwatobi Asani1,2,3, Aderemi Elisha Okeyinka4, Sunday Adeola Ajagbe5,6, Ayodele Ariyo Adebiyi1, Roseline Oluwaseun Ogundokun1,2,7,*, Temitope Samson Adekunle8, Pragasen Mudali5, Matthew Olusegun Adigun5

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047898

    Abstract The study presents the Half Max Insertion Heuristic (HMIH) as a novel approach to solving the Travelling Salesman Problem (TSP). The goal is to outperform existing techniques such as the Farthest Insertion Heuristic (FIH) and Nearest Neighbour Heuristic (NNH). The paper discusses the limitations of current construction tour heuristics, focusing particularly on the significant margin of error in FIH. It then proposes HMIH as an alternative that minimizes the increase in tour distance and includes more nodes. HMIH improves tour quality by starting with an initial tour consisting of a ‘minimum’ polygon and iteratively adding nodes using our novel Half… More >

  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    CrossFormer Embedding DeepLabv3+ for Remote Sensing Images Semantic Segmentation

    Qixiang Tong, Zhipeng Zhu, Min Zhang, Kerui Cao, Haihua Xing*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.049187

    Abstract High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presence of occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the difficulty of segmentation. In this paper, an improved network with a cross-region self-attention mechanism for multi-scale features based on DeepLabv3+is designed to address the difficulties of small object segmentation and blurred target edge segmentation. First, we use CrossFormer as the backbone feature extraction network to achieve the interaction between large- and small-scale features, and establish self-attention associations between features at both large and small scales to capture global contextual feature… More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    ARTICLE

    A Lightweight, Searchable, and Controllable EMR Sharing Scheme

    Xiaohui Yang, Peiyin Zhao*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047666

    Abstract Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer from privacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharing scheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computational overhead of encryption and decryption reaches a lightweight constant level, and supports keyword search and policy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of… More >

Displaying 21-30 on page 3 of 333. Per Page