Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (366)
  • Open Access

    ARTICLE

    Machine Learning for Data Fusion: A Fuzzy AHP Approach for Open Issues

    Vinay Kukreja1, Asha Abraham2, K. Kalaiselvi3, K. Deepa Thilak3, Shanmugasundaram Hariharan4, Shih-Yu Chen5,6,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045136

    Abstract Data fusion generates fused data by combining multiple sources, resulting in information that is more consistent, accurate, and useful than any individual source and more reliable and consistent than the raw original data, which are often imperfect, inconsistent, complex, and uncertain. Traditional data fusion methods like probabilistic fusion, set-based fusion, and evidential belief reasoning fusion methods are computationally complex and require accurate classification and proper handling of raw data. Data fusion is the process of integrating multiple data sources. Data filtering means examining a dataset to exclude, rearrange, or apportion data according to the criteria. Different sensors generate a large… More >

  • Open Access

    ARTICLE

    Multi-Equipment Detection Method for Distribution Lines Based on Improved YOLOx-s

    Lei Hu1,*, Yuanwen Lu1, Si Wang2, Wenbin Wang3, Yongmei Zhang4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042974

    Abstract The YOLOx-s network does not sufficiently meet the accuracy demand of equipment detection in the autonomous inspection of distribution lines by Unmanned Aerial Vehicle (UAV) due to the complex background of distribution lines, variable morphology of equipment, and large differences in equipment sizes. Therefore, aiming at the difficult detection of power equipment in UAV inspection images, we propose a multi-equipment detection method for inspection of distribution lines based on the YOLOx-s. Based on the YOLOx-s network, we make the following improvements: 1) The Receptive Field Block (RFB) module is added after the shallow feature layer of the backbone network to… More >

  • Open Access

    ARTICLE

    Maximizing Influence in Temporal Social Networks: A Node Feature-Aware Voting Algorithm

    Wenlong Zhu1,2,*, Yu Miao1, Shuangshuang Yang3, Zuozheng Lian1,2, Lianhe Cui1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045646

    Abstract Influence Maximization (IM) aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes. However, most existing studies on the IM problem focus on static social network features, while neglecting the features of temporal social networks. To bridge this gap, we focus on node features reflected by their historical interaction behavior in temporal social networks, i.e., interaction attributes and self-similarity, and incorporate them into the influence maximization algorithm and information propagation model. Firstly, we propose a node feature-aware voting… More >

  • Open Access

    ARTICLE

    SCChOA: Hybrid Sine-Cosine Chimp Optimization Algorithm for Feature Selection

    Shanshan Wang1,2,3, Quan Yuan1, Weiwei Tan1, Tengfei Yang1, Liang Zeng1,2,3,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.044807

    Abstract Feature Selection (FS) is an important problem that involves selecting the most informative subset of features from a dataset to improve classification accuracy. However, due to the high dimensionality and complexity of the dataset, most optimization algorithms for feature selection suffer from a balance issue during the search process. Therefore, the present paper proposes a hybrid Sine-Cosine Chimp Optimization Algorithm (SCChOA) to address the feature selection problem. In this approach, firstly, a multi-cycle iterative strategy is designed to better combine the SineCosine Algorithm (SCA) and the Chimp Optimization Algorithm (ChOA), enabling a more effective search in the objective space. Secondly,… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100% for the binary classification task… More >

  • Open Access

    ARTICLE

    PP-GAN: Style Transfer from Korean Portraits to ID Photos Using Landmark Extractor with GAN

    Jongwook Si1, Sungyoung Kim2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.043797

    Abstract The objective of style transfer is to maintain the content of an image while transferring the style of another image. However, conventional methods face challenges in preserving facial features, especially in Korean portraits where elements like the “Gat” (a traditional Korean hat) are prevalent. This paper proposes a deep learning network designed to perform style transfer that includes the “Gat” while preserving the identity of the face. Unlike traditional style transfer techniques, the proposed method aims to preserve the texture, attire, and the “Gat” in the style image by employing image sharpening and face landmark, with the GAN. The color,… More >

  • Open Access

    ARTICLE

    Joint On-Demand Pruning and Online Distillation in Automatic Speech Recognition Language Model Optimization

    Soonshin Seo1,2, Ji-Hwan Kim2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042816

    Abstract Automatic speech recognition (ASR) systems have emerged as indispensable tools across a wide spectrum of applications, ranging from transcription services to voice-activated assistants. To enhance the performance of these systems, it is important to deploy efficient models capable of adapting to diverse deployment conditions. In recent years, on-demand pruning methods have obtained significant attention within the ASR domain due to their adaptability in various deployment scenarios. However, these methods often confront substantial tradeoffs, particularly in terms of unstable accuracy when reducing the model size. To address challenges, this study introduces two crucial empirical findings. Firstly, it proposes the incorporation of… More >

  • Open Access

    REVIEW

    Fuzzing: Progress, Challenges, and Perspectives

    Zhenhua Yu1, Zhengqi Liu1, Xuya Cong1,*, Xiaobo Li2, Li Yin3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.042361

    Abstract As one of the most effective techniques for finding software vulnerabilities, fuzzing has become a hot topic in software security. It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system. In recent years, considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing, so there are more and more methods and forms, which make it difficult to have a comprehensive understanding of the technique. This paper conducts a thorough survey of fuzzing, focusing on its general process, classification, common application scenarios, and some state-of-the-art techniques that have been… More >

  • Open Access

    ARTICLE

    A Novel Energy and Communication Aware Scheduling on Green Cloud Computing

    Laila Almutairi1, Shabnam Mohamed Aslam2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.040268

    Abstract The rapid growth of service-oriented and cloud computing has created large-scale data centres worldwide. Modern data centres’ operating costs mostly come from back-end cloud infrastructure and energy consumption. In cloud computing, extensive communication resources are required. Moreover, cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user requirements. It is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching buffers. This paper proposes a novel Energy and Communication (EC) aware scheduling (EC-scheduler) algorithm for green cloud computing, which optimizes data centre energy consumption and traffic load. The primary goal… More >

  • Open Access

    ARTICLE

    Optical Neural Networks: Analysis and Prospects for 5G Applications

    Doaa Sami Khafaga1, Zongming Lv2, Imran Khan3,4, Shebnam M. Sefat5, Amel Ali Alhussan1,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.039956

    Abstract With the capacities of self-learning, acquainted capacities, high-speed looking for ideal arrangements, solid nonlinear fitting, and mapping self-assertively complex nonlinear relations, neural systems have made incredible advances and accomplished broad application over the final half-century. As one of the foremost conspicuous methods for fake insights, neural systems are growing toward high computational speed and moo control utilization. Due to the inborn impediments of electronic gadgets, it may be troublesome for electronic-implemented neural systems to make the strides these two exhibitions encourage. Optical neural systems can combine optoelectronic procedures and neural organization models to provide ways to break the bottleneck. This… More >

Displaying 301-310 on page 31 of 366. Per Page