Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,267)
  • Open Access

    ARTICLE

    Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment

    Bin Wu1,2, Xianyi Chen3, Jinzhou Huang4,*, Caicai Zhang5, Jing Wang6, Jing Yu1,2, Zhiqiang Zhao7, Zhuolin Mei1,2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3177-3194, 2024, DOI:10.32604/cmc.2023.047147

    Abstract In a cloud environment, outsourced graph data is widely used in companies, enterprises, medical institutions, and so on. Data owners and users can save costs and improve efficiency by storing large amounts of graph data on cloud servers. Servers on cloud platforms usually have some subjective or objective attacks, which make the outsourced graph data in an insecure state. The issue of privacy data protection has become an important obstacle to data sharing and usage. How to query outsourcing graph data safely and effectively has become the focus of research. Adjacency query is a basic and frequently used operation in… More >

  • Open Access

    ARTICLE

    A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices

    Muhammad Saad1, Muhammad Raheel Bhutta2, Jongik Kim3,*, Tae-Sun Chung1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4263-4282, 2024, DOI:10.32604/cmc.2024.047132

    Abstract With the increase in IoT (Internet of Things) devices comes an inherent challenge of security. In the world today, privacy is the prime concern of every individual. Preserving one’s privacy and keeping anonymity throughout the system is a desired functionality that does not come without inevitable trade-offs like scalability and increased complexity and is always exceedingly difficult to manage. The challenge is keeping confidentiality and continuing to make the person innominate throughout the system. To address this, we present our proposed architecture where we manage IoT devices using blockchain technology. Our proposed architecture works on and off blockchain integrated with… More >

  • Open Access

    ARTICLE

    Improve Chinese Aspect Sentiment Quadruplet Prediction via Instruction Learning Based on Large Generate Models

    Zhaoliang Wu1, Yuewei Wu1,2, Xiaoli Feng1, Jiajun Zou3, Fulian Yin1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3391-3412, 2024, DOI:10.32604/cmc.2024.047076

    Abstract Aspect-Based Sentiment Analysis (ABSA) is a fundamental area of research in Natural Language Processing (NLP). Within ABSA, Aspect Sentiment Quad Prediction (ASQP) aims to accurately identify sentiment quadruplets in target sentences, including aspect terms, aspect categories, corresponding opinion terms, and sentiment polarity. However, most existing research has focused on English datasets. Consequently, while ASQP has seen significant progress in English, the Chinese ASQP task has remained relatively stagnant. Drawing inspiration from methods applied to English ASQP, we propose Chinese generation templates and employ prompt-based instruction learning to enhance the model’s understanding of the task, ultimately improving ASQP performance in the… More >

  • Open Access

    ARTICLE

    Unmanned Ship Identification Based on Improved YOLOv8s Algorithm

    Chun-Ming Wu1, Jin Lei1,*, Wu-Kai Liu1, Mei-Ling Ren1, Ling-Li Ran2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3071-3088, 2024, DOI:10.32604/cmc.2023.047062

    Abstract Aiming at defects such as low contrast in infrared ship images, uneven distribution of ship size, and lack of texture details, which will lead to unmanned ship leakage misdetection and slow detection, this paper proposes an infrared ship detection model based on the improved YOLOv8 algorithm (R_YOLO). The algorithm incorporates the Efficient Multi-Scale Attention mechanism (EMA), the efficient Reparameterized Generalized-feature extraction module (CSPStage), the small target detection header, the Repulsion Loss function, and the context aggregation block (CABlock), which are designed to improve the model’s ability to detect targets at multiple scales and the speed of model inference. The algorithm… More >

  • Open Access

    ARTICLE

    Fake News Detection Based on Text-Modal Dominance and Fusing Multiple Multi-Model Clues

    Lifang Fu1, Huanxin Peng2,*, Changjin Ma2, Yuhan Liu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4399-4416, 2024, DOI:10.32604/cmc.2024.047053

    Abstract In recent years, how to efficiently and accurately identify multi-model fake news has become more challenging. First, multi-model data provides more evidence but not all are equally important. Secondly, social structure information has proven to be effective in fake news detection and how to combine it while reducing the noise information is critical. Unfortunately, existing approaches fail to handle these problems. This paper proposes a multi-model fake news detection framework based on Tex-modal Dominance and fusing Multiple Multi-model Cues (TD-MMC), which utilizes three valuable multi-model clues: text-model importance, text-image complementary, and text-image inconsistency. TD-MMC is dominated by textural content and… More >

  • Open Access

    ARTICLE

    Machine-Learning Based Packet Switching Method for Providing Stable High-Quality Video Streaming in Multi-Stream Transmission

    Yumin Jo1, Jongho Paik2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4153-4176, 2024, DOI:10.32604/cmc.2024.047046

    Abstract Broadcasting gateway equipment generally uses a method of simply switching to a spare input stream when a failure occurs in a main input stream. However, when the transmission environment is unstable, problems such as reduction in the lifespan of equipment due to frequent switching and interruption, delay, and stoppage of services may occur. Therefore, applying a machine learning (ML) method, which is possible to automatically judge and classify network-related service anomaly, and switch multi-input signals without dropping or changing signals by predicting or quickly determining the time of error occurrence for smooth stream switching when there are problems such as… More >

  • Open Access

    ARTICLE

    Missing Value Imputation for Radar-Derived Time-Series Tracks of Aerial Targets Based on Improved Self-Attention-Based Network

    Zihao Song, Yan Zhou*, Wei Cheng, Futai Liang, Chenhao Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3349-3376, 2024, DOI:10.32604/cmc.2024.047034

    Abstract The frequent missing values in radar-derived time-series tracks of aerial targets (RTT-AT) lead to significant challenges in subsequent data-driven tasks. However, the majority of imputation research focuses on random missing (RM) that differs significantly from common missing patterns of RTT-AT. The method for solving the RM may experience performance degradation or failure when applied to RTT-AT imputation. Conventional autoregressive deep learning methods are prone to error accumulation and long-term dependency loss. In this paper, a non-autoregressive imputation model that addresses the issue of missing value imputation for two common missing patterns in RTT-AT is proposed. Our model consists of two… More >

  • Open Access

    ARTICLE

    Material-SAM: Adapting SAM for Material XCT

    Xuelong Wu1, Junsheng Wang1,*, Zhongyao Li1, Yisheng Miao1, Chengpeng Xue1, Yuling Lang2, Decai Kong2, Xiaoying Ma2, Haibao Qiao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3703-3720, 2024, DOI:10.32604/cmc.2024.047027

    Abstract X-ray Computed Tomography (XCT) enables non-destructive acquisition of the internal structure of materials, and image segmentation plays a crucial role in analyzing material XCT images. This paper proposes an image segmentation method based on the Segment Anything model (SAM). We constructed a dataset of carbide in nickel-based single crystal superalloys XCT images and preprocessed the images using median filtering, histogram equalization, and gamma correction. Subsequently, SAM was fine-tuned to adapt to the task of material XCT image segmentation, resulting in Material-SAM. We compared the performance of threshold segmentation, SAM, U-Net model, and Material-SAM. Our method achieved 88.45% Class Pixel Accuracy… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Approach for Improvised QoE in Video Services over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3195-3213, 2024, DOI:10.32604/cmc.2023.046911

    Abstract Video streaming applications have grown considerably in recent years. As a result, this becomes one of the most significant contributors to global internet traffic. According to recent studies, the telecommunications industry loses millions of dollars due to poor video Quality of Experience (QoE) for users. Among the standard proposals for standardizing the quality of video streaming over internet service providers (ISPs) is the Mean Opinion Score (MOS). However, the accurate finding of QoE by MOS is subjective and laborious, and it varies depending on the user. A fully automated data analytics framework is required to reduce the inter-operator variability characteristic… More >

  • Open Access

    ARTICLE

    Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs

    Rahul Gupta1, Kapil Sharma1,*, R. K. Garg2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4283-4301, 2024, DOI:10.32604/cmc.2024.046890

    Abstract The prevalence of smartphones is deeply embedded in modern society, impacting various aspects of our lives. Their versatility and functionalities have fundamentally changed how we communicate, work, seek entertainment, and access information. Among the many smartphones available, those operating on the Android platform dominate, being the most widely used type. This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years. Therefore, there is an urgent need to develop new methods for detecting Android malware. The literature contains numerous works related to Android malware detection. As far as our understanding… More >

Displaying 41-50 on page 5 of 5267. Per Page